{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T19:42:16Z","timestamp":1725565336010},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540222620"},{"type":"electronic","value":"9783540259695"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-25969-5_101","type":"book-chapter","created":{"date-parts":[[2010,9,10]],"date-time":"2010-09-10T23:26:00Z","timestamp":1284161160000},"page":"1092-1099","source":"Crossref","is-referenced-by-count":0,"title":["Intelligent Assessment of Distributed Security in TCP\/IP Networks"],"prefix":"10.1007","author":[{"given":"Rui","family":"Costa Cardoso","sequence":"first","affiliation":[]},{"given":"M\u00e1rio","family":"Marques Freire","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"101_CR1","doi-asserted-by":"crossref","unstructured":"Gruteser, M., Grunwald, D.: A Methodological Assessment of Location Privacy Risks in Wireless Hotspot Networks. In: Proceedings of First International Conference on Security in Pervasive Computing, Boppard, Germany (2003)","DOI":"10.1007\/978-3-540-39881-3_5"},{"issue":"3","key":"101_CR2","first-page":"185","volume":"18","author":"G.L. Wooley","year":"2003","unstructured":"Wooley, G.L.: Results of Classroom Enterprise Security Assessment of Five Large Enterprise Networks. Journal of Computing in Small Colleges\u00a018(3), 185\u2013195 (2003)","journal-title":"Journal of Computing in Small Colleges"},{"key":"101_CR3","unstructured":"Securitymetrics: Integrated Vulnerability Assessment, Intrusion Detection and Prevention. Technical White Paper, Securitymetrics (2003)"},{"key":"101_CR4","unstructured":"Bace, R.: An Introduction to Intrusion Detection & Assessment. Technical White Paper, ICSA (1999)"},{"key":"101_CR5","unstructured":"Swanson, M., Bartol, N., Sabato, J., Hash, J., Graffo, L.: Computer Security: Security Metrics Guide for Information Technology Systems. Information Technology Laboratory, National Institute of Standards and Technology, Special Publication 800-55"},{"key":"101_CR6","unstructured":"http:\/\/www.nessus.org"},{"key":"101_CR7","unstructured":"http:\/\/www-arc.com\/sara\/"},{"key":"101_CR8","unstructured":"Qualys: On-Demand Security Audits and Vulnerability Management: A Proactive Approach to Network Security. Technical White Paper, Qualys (2003)"},{"key":"101_CR9","unstructured":"Balasubramaniyan, J.S., Garcia-Fernandez, J.O., Isacoff, D., Spafford, E., Zamboni, D.: Architecture for Intrusion Detection Using Autonomous Agents. Technical Report 98\/05, Purdue University (1998)"},{"key":"101_CR10","unstructured":"Huang, T.-C., Hu, Y.-J.: Incentives of Agent-Based Distributed Intrusion Detection Systems on the Open Internet. In: Proceedings of the International Conference on Security and Management (2002)"},{"key":"101_CR11","doi-asserted-by":"crossref","unstructured":"Pedireddy, T., Vidal, J.M.: A Prototype MultiAgent Network Security System. In: Proceedings of the Second International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2003), Melbourne, Australia (2003)","DOI":"10.1145\/860575.860812"},{"key":"101_CR12","unstructured":"Torrellas, G. A. S., Vargas, L., A. V.: Modelling Flexible Network Security Systems Using Multi-Agents Systems: Security Assessment Considerations. In: Proceedings of the 1st International Symposium on Information and Communication Technologies, Dublin, Ireland, pp. 365-371 (2003)"},{"key":"101_CR13","unstructured":"Givans, N., Bartol, N., Gallaghe, L. A., Kormos, C.: Using Security Metrics to Assess Risk Management Capabilities. In: Proceedings of the 22nd National Information Systems Security Conference (1999)"},{"key":"101_CR14","unstructured":"Lowans, P.W.: Implementing a Network Security Metrics Program. GIAC Security Essentials Certification, Technical Paper (2001)"},{"key":"101_CR15","unstructured":"Lee, R.: Network Security: Determining Your Risk Index. Novell Systems Research (1996)"},{"key":"101_CR16","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1002\/(SICI)1099-1190(199905\/06)9:3<135::AID-NEM311>3.0.CO;2-5","volume":"9","author":"K. Al-Tawil","year":"1999","unstructured":"Al-Tawil, K., Al-Kaltham, I.A.: Evaluation and Testing of Internet Firewalls. International Journal of Network Management\u00a09, 135\u2013149 (1999)","journal-title":"International Journal of Network Management"},{"key":"101_CR17","unstructured":"Mell, P.: Understanding the World of your Enemy with I-CAT (Internet-Categorization of Attacks Toolkit). In: Proceedings of 22nd National Information System Security Conference (1999)"},{"key":"101_CR18","doi-asserted-by":"crossref","unstructured":"Cardoso, R. C., Freire, M. M.: Management of Security in TCP\/IP Hosts Using Dedicated Monitoring Applications. In: Ga\u00efti, D., Pujolle, G., Al-Naamany, A. M., Bourdoucen, H., Khriji, L. (Eds.): Network Control and Engineering for QoS, Security and Mobility. Kluwer Academic Publishers, Boston, pp. 263-273 (2003)","DOI":"10.1007\/978-0-387-35703-4_20"}],"container-title":["Lecture Notes in Computer Science","High Speed Networks and Multimedia Communications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-25969-5_101.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,9]],"date-time":"2021-11-09T10:17:23Z","timestamp":1636453043000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-25969-5_101"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540222620","9783540259695"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-25969-5_101","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}