{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T04:54:26Z","timestamp":1725771266787},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642545245"},{"type":"electronic","value":"9783642545252"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-642-54525-2_29","type":"book-chapter","created":{"date-parts":[[2014,2,7]],"date-time":"2014-02-07T14:26:22Z","timestamp":1391783182000},"page":"322-333","source":"Crossref","is-referenced-by-count":3,"title":["CASSHH \u2013 Case Adaptive SSH Honeypot"],"prefix":"10.1007","author":[{"given":"Adrian","family":"Pauna","sequence":"first","affiliation":[]},{"given":"Victor Valeriu","family":"Patriciu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"29_CR1","unstructured":"Kippo: A ssh honeypot, \n                    \n                      http:\/\/code.google.com\/p\/kippo\/"},{"key":"29_CR2","unstructured":"Nazario, J.: Kippo Log Analysis, \n                    \n                      http:\/\/monkey.org\/~jose\/honeynet\/kippo\/"},{"key":"29_CR3","unstructured":"The Secure Shell (SSH) Protocol Architecture, \n                    \n                      http:\/\/www.ietf.org\/rfc\/rfc4251.txt"},{"key":"29_CR4","unstructured":"Tamminen, U.: Kippo 0.8 released, \n                    \n                      http:\/\/www.rpg.fi\/desaster\/blog\/2013\/04\/05\/kippo-0-8-released\/"},{"key":"29_CR5","unstructured":"Python Twisted, \n                    \n                      http:\/\/twistedmatrix.com\/trac\/"},{"volume-title":"Case-Based Reasoning: Experiences, Lessons, and Future Directions","year":"1996","key":"29_CR6","unstructured":"In Leake, D. (ed.): Case-Based Reasoning: Experiences, Lessons, and Future Directions. AAAI Press\/MIT Press, Menlo Park (1996)"},{"key":"29_CR7","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"334","DOI":"10.1007\/11596981_50","volume-title":"Computational Intelligence and Security","author":"L. Li","year":"2005","unstructured":"Li, L., Tang, W., Wang, R.: A CBR Engine Adapting to IDS. In: Hao, Y., Liu, J., Wang, Y.-P., Cheung, Y.-M., Yin, H., Jiao, L., Ma, J., Jiao, Y.-C. (eds.) CIS 2005. LNCS (LNAI), vol.\u00a03802, pp. 334\u2013339. Springer, Heidelberg (2005)"},{"key":"29_CR8","unstructured":"Zakaria, W., Kiah, M.L.M.: A review on artificial intelligence techniques for developing intelligent honeypot. In: Proceeding of: 8th International Conference on Computing Technology and Information Management, At Seoul, Korea (2012)"},{"key":"29_CR9","doi-asserted-by":"crossref","unstructured":"Burmeister, B., Sundermeyer, K.: Cooperative problem-solving guided by intentions and perception. In: Werner, E., Demazeau, Y. (eds.) Decentralized A.I. 3. North Holland, Amsterdam (1992)","DOI":"10.1145\/152683.152690"},{"key":"29_CR10","doi-asserted-by":"crossref","unstructured":"Georgeff, M.P., Lansky, A.L.: Procedural knowledge. In: Proceedingsof the IEEE Special Issue on Knowledge Representation, vol.\u00a074, pp. 1383\u20131398 (1986)","DOI":"10.1109\/PROC.1986.13639"},{"key":"29_CR11","series-title":"LNAI","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1007\/3-540-58855-8_17","volume-title":"Intelligent Agents","author":"J.P. Muller","year":"1995","unstructured":"Muller, J.P., Pischel, M., Thiel, M.: Modelling reactive behaviour in vertically layered agent architectures. In: Wooldridge, M.J., Jennings, N.R. (eds.) ECAI 1994 and ATAL 1994. LNCS (LNAI), vol.\u00a0890, pp. 261\u2013276. Springer, Heidelberg (1995)"},{"issue":"1","key":"29_CR12","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1016\/0004-3702(93)90034-9","volume":"60","author":"Y. Shoham","year":"1993","unstructured":"Shoham, Y.: Agent-oriented programming. Artificial Intelligence\u00a060(1), 51\u201392 (1993)","journal-title":"Artificial Intelligence"},{"key":"29_CR13","unstructured":"Russell, S.J., Norvig, P.: Artificial Intelligence: A Modern Approach, ch. 2, 2nd edn. Prentice Hall, Upper Saddle River (2003) ISBN 0-13-790395-2"},{"key":"29_CR14","unstructured":"Laza, R., G\u00f3mez, A., Pav\u00f3n, R., Corchado, J.M.: A Case-Based Reasoning Approach to the Implementation of BDI Agents. In: ECCBR Workshops, pp. 27\u201330 (2002)"},{"key":"29_CR15","first-page":"119","volume-title":"DSN 2007: Proceedings of the 37th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks","author":"D. Ramsbrock","year":"2007","unstructured":"Ramsbrock, D., Berthier, R., Cukier, M.: Profiling attacker behavior following SSH compromises. In: DSN 2007: Proceedings of the 37th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks, pp. 119\u2013124. IEEE Computer Society, Washington, DC (2007)"},{"key":"29_CR16","unstructured":"Uses of Class jcolibri.method.retrieve.NNretrieval.similarity.global.Average, \n                    \n                      http:\/\/gaia.fdi.ucm.es\/files\/people\/juanan\/jcolibri\/doc\/api\/jcolibri\/method\/retrieve\/NNretrieval\/similarity\/global\/class-use\/Average.html"},{"key":"29_CR17","unstructured":"CASSHH Honeypot code repo: \n                    \n                      http:\/\/code.google.com\/p\/casshh\/"}],"container-title":["Communications in Computer and Information Science","Recent Trends in Computer Networks and Distributed Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-54525-2_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,1,30]],"date-time":"2019-01-30T22:50:31Z","timestamp":1548888631000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-54525-2_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783642545245","9783642545252"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-54525-2_29","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2014]]}}}