{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,7]],"date-time":"2025-11-07T08:44:35Z","timestamp":1762505075533},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2005,9,26]],"date-time":"2005-09-26T00:00:00Z","timestamp":1127692800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Auton Agent Multi-Agent Syst"],"published-print":{"date-parts":[[2006,1]]},"DOI":"10.1007\/s10458-005-4195-6","type":"journal-article","created":{"date-parts":[[2005,9,27]],"date-time":"2005-09-27T05:12:18Z","timestamp":1127797938000},"page":"93-114","source":"Crossref","is-referenced-by-count":3,"title":["CONFIDANT: Collaborative Object Notification Framework for Insider Defense using Autonomous Network Transactions"],"prefix":"10.1007","volume":"12","author":[{"given":"Adam J.","family":"Rocke","sequence":"first","affiliation":[]},{"given":"Ronald F.","family":"Demara","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2005,9,26]]},"reference":[{"issue":"5","key":"4195_CR1","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1109\/52.877859","volume":"17","author":"J. McHugh","year":"2000","journal-title":"IEEE Software"},{"key":"4195_CR2","unstructured":"J. McHugh, A. Christie, and J. Allen, Intrusion detection: Implementation and operational issues, Software Engineering Institute Computer Emergency Response Team White Paper, 2001. URL http:\/\/www.stsc.hill.af.mil\/crosstalk\/2001\/jan\/mchugh.asp"},{"key":"4195_CR3","unstructured":"S. Grafinkel, G. Spafford, and A. Schwartz, Practical Unix & Internet Security, O\u2019Reilly and Associates, 2003."},{"key":"4195_CR4","unstructured":"K. Seifried, Linux administrator\u2019s security guide \u2013 attack detection. URL http:\/\/gd.tuwien.ac.at\/opsys\/linux\/lasg-www\/attack-detection"},{"key":"4195_CR5","unstructured":"G. H. Kim and E. H. Spafford, Experiences with tripwire: Using integrity checkers for intrusion detection, Tech. Rep. CSD-TR-94-012, Department of Computer Sciences, Purdue University, 1994."},{"key":"4195_CR6","unstructured":"Tripwire, Inc., Tripwire for servers for security & network management. URL http:\/\/www.tripwire.com\/products\/servers"},{"key":"4195_CR7","unstructured":"Tripwire, Inc., Tripwire manager for enterprise \u2013 wide security & network management. URL http:\/\/www.tripwire.com\/products\/manager"},{"key":"4195_CR8","unstructured":"R. Lehti, Advanced intrusion detection environment. URL http:\/\/www.cs.tut.fi\/~rammer\/aide.html"},{"key":"4195_CR9","unstructured":"Rocksoft, Veracity \u2013 nothing can change without you knowing: Data integrity assurance. URL http:\/\/www.rocksoft.com\/veracity\/"},{"key":"4195_CR10","unstructured":"E. L. Cashin, Integrit file verification system. URL http:\/\/integrit.sourceforge.net"},{"issue":"1","key":"4195_CR11","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1016\/S0167-4048(04)00068-9","volume":"23","author":"R. F. DeMara","year":"2004","journal-title":"Computers & Security"},{"key":"4195_CR12","unstructured":"M. Crosbie and G. Spafford, Active defense of a computer system using autonomous agents, Tech. Rep. 95-008, COAST Group, Department of Computer Sciences, Purdue University, February 1995."},{"key":"4195_CR13","doi-asserted-by":"crossref","unstructured":"J. S. Balasubramaniyan, J. O. Garcia-Fernandez, D. Isacoff, E. Spafford, and D. Zamboni, \u201cAn architecture for intrusion detection using autonomous agents\u201d, Proceedings. 14th Annual Computer Security Applications Conference, pp. 13\u201324, 1998.","DOI":"10.1109\/CSAC.1998.738563"},{"key":"4195_CR14","doi-asserted-by":"crossref","unstructured":"M. C. Bernardes and E. dos Santos Moreira, \u201cImplementation of an intrusion detection system based on mobile agents\u201d, Proceedings. International Symposium on Software Engineering for Parallel and Distributed Systems, pp. 158\u2013164, 2000.","DOI":"10.1109\/PDSE.2000.847862"},{"key":"4195_CR15","doi-asserted-by":"crossref","unstructured":"W. Jansen, P. Mell, T. Karygiannis, and D. Marks, Applying mobile agents to intrusion detection and response, National Institute of Standards and Technology, Computer Security Division, 1999. URL http:\/\/csrc.nist.gov\/publications\/nistir\/ ir6416.pdf","DOI":"10.6028\/NIST.IR.6416"},{"key":"4195_CR16","unstructured":"C. Costa, TACH design concept, Lockeed Martin Corporation, 1998."},{"key":"4195_CR17","unstructured":"G. Wang, R. F. DeMara, and A. J. Rocke, \u201cMobility-enhanced file integrity analyzer for networked environments\u201d, in Proceedings of the 9th World Multi-Conference on Systemics, Cybernetics, and Informatics, Vol. 2, 2005, pp. 341\u2013346."},{"key":"4195_CR18","unstructured":"D. A. Frincke, D. Tobin, J. C. McConnell, J. Marconi, and D. Polla, \u201cA framework for cooperative intrusion detection\u201d, in Proceedings of the 21st NIST-NCSC National Information Systems Security Conference, 1998, pp. 361\u2013373. URL http:\/\/citeseer.nj.nec.com\/frincke98framework.html"},{"issue":"1","key":"4195_CR19","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1109\/65.484228","volume":"10","author":"G. B. White","year":"1996","journal-title":"IEEE Network"},{"key":"4195_CR20","doi-asserted-by":"crossref","unstructured":"P. Kotzanikolaou, M. Burmester, and V. Chrissikopoulos, \u201cSecure transactions with mobile agents in hostile environments\u201d, in Proceedings of the 5th Australasian Conference on Information Security and Privacy, pp. 289\u2013297, 2000.","DOI":"10.1007\/10718964_24"},{"key":"4195_CR21","unstructured":"W. Jansen, Countermeasures for mobile agent security, Computer Communications, Special Issue on Advanced Security Techniques for Network Protection."},{"key":"4195_CR22","unstructured":"W. Jansen and T. Karygiannis, NIST special publication 800-19 \u2013 mobile agent security, National Institute of Standards and Technology. URL http:\/\/csrc.ncsl.nist.gov\/mobilesecurity\/Publications\/ sp800-19.pdf"},{"key":"4195_CR23","unstructured":"CERIAS \u2013 autonomous agents for intrusion detection. URL http:\/\/www.cerias.purdue.edu\/about\/history\/coast\/projec ts\/ aafid.php"},{"key":"4195_CR24","unstructured":"OpenSSL: Open source toolkit implementing the secure socket layer protocol. URL http:\/\/www.openssl.org\/"},{"key":"4195_CR25","unstructured":"P. Burkholder, SSL man-in-the-middle attacks, Tech. rep., The SANS Institute, 2002. URL http:\/\/www.sans.org\/rr\/papers\/60\/480.pdf"},{"key":"4195_CR26","unstructured":"IBM PCI cryptographic coprocessor. URLhttp:\/\/www-3.ibm.com\/security\/cryptocards\/library.shtml"},{"key":"4195_CR27","unstructured":"A. J. Rocke and R. F. DeMara, Trusted detection of unauthorized filesystem modifications to combat insider tampering, Tech. Rep. UCF-ECE-0410, School of Electrical Engineering and Computer Science, University of Central Florida, November 2004. URL http:\/\/netmoc.cpe.ucf.edu:8080\/internal\/yearReportsDetail.jsp?year=2004&id=0410"}],"container-title":["Autonomous Agents and Multi-Agent Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10458-005-4195-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10458-005-4195-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10458-005-4195-6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,9]],"date-time":"2020-04-09T22:23:08Z","timestamp":1586470988000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10458-005-4195-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,9,26]]},"references-count":27,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2006,1]]}},"alternative-id":["4195"],"URL":"https:\/\/doi.org\/10.1007\/s10458-005-4195-6","relation":{},"ISSN":["1387-2532","1573-7454"],"issn-type":[{"value":"1387-2532","type":"print"},{"value":"1573-7454","type":"electronic"}],"subject":[],"published":{"date-parts":[[2005,9,26]]}}}