{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T14:04:45Z","timestamp":1725890685267},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642372995"},{"type":"electronic","value":"9783642373008"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-37300-8_13","type":"book-chapter","created":{"date-parts":[[2013,3,13]],"date-time":"2013-03-13T04:53:59Z","timestamp":1363150439000},"page":"214-231","source":"Crossref","is-referenced-by-count":1,"title":["Self-organized Collaboration of Distributed IDS Sensors"],"prefix":"10.1007","author":[{"given":"Karel","family":"Bartos","sequence":"first","affiliation":[]},{"given":"Martin","family":"Rehak","sequence":"additional","affiliation":[]},{"given":"Michal","family":"Svoboda","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"13_CR1","unstructured":"Cisco netflow, \n                    \n                      http:\/\/www.cisco.com\/warp\/public\/732\/tech\/netflow"},{"key":"13_CR2","doi-asserted-by":"crossref","unstructured":"Aumann, R.: Correlated equilibrium as an expression of Bayesian rationality. Econometrica: Journal of the Econometric Society (1987)","DOI":"10.2307\/1911154"},{"key":"13_CR3","doi-asserted-by":"crossref","unstructured":"Blum, A., Mansour, Y.: Learning, regret minimization and equilibria. In: Algorithmic Game Theory, ch. 4, pp. 79\u2013101. Cambridge University Press (2007)","DOI":"10.1017\/CBO9780511800481.006"},{"key":"13_CR4","doi-asserted-by":"crossref","unstructured":"Debar, H., Curry, D., Feinstein, B.: The intrusion detection message exchange format (idmef). rfc 4765 March, (4765) (2007)","DOI":"10.17487\/rfc4765"},{"key":"13_CR5","doi-asserted-by":"crossref","unstructured":"Elshoush, H.T., Osman, I.M.: Alert correlation in collaborative intelligent intrusion detection systems\u2013a survey. Applied Soft Computing (2011)","DOI":"10.1016\/j.asoc.2010.12.004"},{"issue":"5","key":"13_CR6","doi-asserted-by":"publisher","first-page":"1401","DOI":"10.1111\/j.1468-0262.2005.00625.x","volume":"73","author":"S. Hart","year":"2005","unstructured":"Hart, S.: Adaptive Heuristics. Econometrica\u00a073(5), 1401\u20131430 (2005)","journal-title":"Econometrica"},{"key":"13_CR7","unstructured":"Hart, S.: Nash equilibrium and dynamics. Discussion Paper Series dp490, Center for Rationality and Interactive Decision Theory, Hebrew University, Jerusalem (2008)"},{"issue":"5","key":"13_CR8","doi-asserted-by":"publisher","first-page":"1127","DOI":"10.1111\/1468-0262.00153","volume":"68","author":"S. Hart","year":"2000","unstructured":"Hart, S., Mas-Colell, A.: A simple adaptive procedure leading to correlated equilibrium. Econometrica\u00a068(5), 1127\u20131150 (2000)","journal-title":"Econometrica"},{"key":"13_CR9","unstructured":"Huynh, T.D., Jennings, N.R., Shadbolt, N.R.: Fire: An integrated trust and reputation model for open multi-agent systems. In: ECAI, pp. 18\u201322 (2004)"},{"key":"13_CR10","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511800481","volume-title":"Algorithmic Game Theory","author":"N. Nisan","year":"2007","unstructured":"Nisan, N., Roughgarden, T., Tardos, E., Vazirani, V.V.: Algorithmic Game Theory. Cambridge University Press, New York (2007)"},{"issue":"3","key":"13_CR11","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1109\/MIS.2009.42","volume":"24","author":"M. Rehak","year":"2009","unstructured":"Rehak, M., Pechoucek, M., Grill, M., Stiborek, J., Bartos, K., Celeda, P.: Adaptive multiagent system for network traffic monitoring. IEEE Intelligent Systems\u00a024(3), 16\u201325 (2009)","journal-title":"IEEE Intelligent Systems"},{"issue":"3","key":"13_CR12","doi-asserted-by":"publisher","first-page":"312","DOI":"10.1109\/TAC.2005.843878","volume":"50","author":"J. Shamma","year":"2005","unstructured":"Shamma, J., Arslan, G.: Dynamic fictitious play, dynamic gradient play, and distributed convergence to Nash equilibria. IEEE Transactions on Automatic Control\u00a050(3), 312\u2013327 (2005)","journal-title":"IEEE Transactions on Automatic Control"},{"key":"13_CR13","doi-asserted-by":"crossref","unstructured":"Sutton, R.S., Barto, A.G.: Reinforcement Learning: An Introduction. The MIT Press (March 1998)","DOI":"10.1109\/TNN.1998.712192"},{"key":"13_CR14","unstructured":"Wunder, M., Littman, M.L., Babes, M.: Classes of multiagent q-learning dynamics with epsilon-greedy exploration. In: ICML 2010, pp. 1167\u20131174 (2010)"},{"key":"13_CR15","unstructured":"Zinkevich, M., Johanson, M., Bowling, M.H., Piccione, C.: Regret minimization in games with incomplete information. In: Platt, J.C., Koller, D., Singer, Y., Roweis, S.T. (eds.) NIPS. MIT Press (2007)"}],"container-title":["Lecture Notes in Computer Science","Detection of Intrusions and Malware, and Vulnerability Assessment"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-37300-8_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,11]],"date-time":"2019-05-11T14:44:56Z","timestamp":1557585896000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-37300-8_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642372995","9783642373008"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-37300-8_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}