{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T19:33:00Z","timestamp":1725564780928},"publisher-location":"Berlin, Heidelberg","reference-count":29,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540244677"},{"type":"electronic","value":"9783540305828"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/978-3-540-30582-8_9","type":"book-chapter","created":{"date-parts":[[2010,9,7]],"date-time":"2010-09-07T02:10:32Z","timestamp":1283825432000},"page":"80-88","source":"Crossref","is-referenced-by-count":2,"title":["SAPA: Software Agents for Prevention and Auditing of Security Faults in Networked Systems"],"prefix":"10.1007","author":[{"given":"Rui","family":"Costa Cardoso","sequence":"first","affiliation":[]},{"given":"M\u00e1rio","family":"Marques Freire","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"9_CR1","doi-asserted-by":"crossref","unstructured":"Householder, A., Houle, K., Dougherty, C.: Computer Attack Trends Challenge Internet Security. IEEE Computer, Security and Privacy - Supplement, 5\u20137 (April 2002)","DOI":"10.1109\/MC.2002.1012422"},{"key":"9_CR2","unstructured":"CERT, http:\/\/www.cert.org (Accessed 05\/30\/2004)"},{"key":"9_CR3","unstructured":"NIST: National Institute of Standards and Technology, http:\/\/www.nist.org (Accessed 05\/30\/2004)"},{"key":"9_CR4","unstructured":"Nessus, http:\/\/www.nessus.org (Accessed 05\/30\/2004)"},{"key":"9_CR5","unstructured":"SARA: The Security Auditors Research Assistant, http:\/\/www-arc.com\/sara\/ (Accessed 05\/30\/2004)"},{"key":"9_CR6","unstructured":"Securitymetrics. Integrated Vulnerability Assessment, Intrusion Detection and Prevention. Technical White Paper, Securitymetrics (2003)"},{"key":"9_CR7","unstructured":"Qualys. On-Demand Security Audits and Vulnerability Management: A Proactive Approach to Network Security. Technical White Paper, Qualys (2003)"},{"key":"9_CR8","unstructured":"Bace, R.: An Introduction to Intrusion Detection & Assessment. In: Technical White Paper, ICSA (1999)"},{"key":"9_CR9","unstructured":"Nmap, http:\/\/www.nmap.org (Accessed 05\/30\/2004)"},{"key":"9_CR10","unstructured":"Saint, http:\/\/www.saintcorporation.com (Accessed 05\/30\/2004)"},{"key":"9_CR11","unstructured":"Snort: Open source network intrusion detection system, http:\/\/snort.org (Accessed 05\/30\/2004)"},{"key":"9_CR12","doi-asserted-by":"crossref","unstructured":"Pedireddy, T., Vidal, J.M.: A Prototype Multiagent Network Security System. In: Proceedings of the Second International Joint Conference on Autonomous Agents and Multiagent Systems AAMAS 2003, Melbourne, Australia, July 14-18 (2003)","DOI":"10.1145\/860575.860812"},{"key":"9_CR13","unstructured":"Humphries, J.W., Pooch, U.W.: Secure Mobile Agents for Network Vulnerability Scanning. In: Proceedings of the 2000 IEEE Workshop on Information Assurance and Security, New York, United States, June 6-7, pp. 19\u201325 (2000)"},{"key":"9_CR14","unstructured":"Zhang, M., Karmouch, A., Impey, R.: Adding Security Features to FIPA Agent Platforms"},{"key":"9_CR15","unstructured":"JADE (Java Agent DEvelopment Framework), http:\/\/jade.tilab.com"},{"key":"9_CR16","unstructured":"Cardoso, R.C., Freire, M.M.: An Agent-based Approach for Detection of Security Vulnerabilities in Networked Systems. In: Proceedings of 11th International Conference on Software, Telecommunications and Computer Networks (SoftCom 2003), Split, Dubrovnik (Croatia), Venice, Ancona (Italy), October 7- 10, pp. 49\u201353 (2003)"},{"key":"9_CR17","unstructured":"CVE: Common Vulnerabilities and Exposures, http:\/\/www.cve.mitre.org (Accessed 05\/30\/2004)"},{"key":"9_CR18","unstructured":"ICAT: Internet Categorization of Attacks Toolkit, http:\/\/icat.nist.gov (Accessed 05\/30\/2004)"},{"key":"9_CR19","unstructured":"Mell, P.: Understanding the World of your Enemy with I-CAT (Internet- Categorization of Attacks Toolkit). In: 22nd National Information System Security Conference (October 1999)"},{"key":"9_CR20","volume-title":"Computer Security Threat Monitoring and Surveillance","author":"J.P. Anderson","year":"1980","unstructured":"Anderson, J.P.: Computer Security Threat Monitoring and Surveillance. James P. Anderson, Co., FortWashington (1980)"},{"issue":"11","key":"9_CR21","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1109\/2.963441","volume":"34","author":"R.A. Martin","year":"2001","unstructured":"Martin, R.A.: Managing Vulnerabilities in Networked Systems. IEEE Computer\u00a034(11), 32\u201338 (2001)","journal-title":"IEEE Computer"},{"key":"9_CR22","doi-asserted-by":"crossref","unstructured":"Kemmerer, R.A., Vigna, G.: Intrusion Detection: A Brief History and Overview. IEEE Computer, Security and Privacy - Supplement, 27\u201329 (April 2002)","DOI":"10.1109\/MC.2002.1012428"},{"key":"9_CR23","doi-asserted-by":"crossref","unstructured":"Manikopoulos, C., Papavassiliou, S.: Network Intrusion and Fault Detection: A Statistical Anomaly Approach. IEEE Communications Magazine\u00a040(10), 76\u201382","DOI":"10.1109\/MCOM.2002.1039860"},{"key":"9_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"389","DOI":"10.1007\/3-540-45801-8_38","volume-title":"Information Networking. Wireless Communications Technologies and Network Applications","author":"B. Kim","year":"2002","unstructured":"Kim, B., Jang, J., Chung, T.M.: Design of Network Security Control Systems for Cooperative Intrusion Detection. In: Chong, I. (ed.) ICOIN 2002. LNCS, vol.\u00a02344, pp. 389\u2013398. Springer, Heidelberg (2002)"},{"key":"9_CR25","unstructured":"Bellifemine, F., et al.: JADE - A FIPA-compliant agent framework. In: Proceedings of PAAM 1999, London, April 1999, pp. 97\u2013108 (1999)"},{"key":"9_CR26","unstructured":"FIPA, http:\/\/www.fipa.org (Accessed 05\/30\/2004)"},{"key":"9_CR27","unstructured":"FIPA ACL Message Structure Specification, http:\/\/www.fipa.org\/specs\/fipa00061\/ (Accessed 05\/30\/2004)"},{"key":"9_CR28","unstructured":"PortsDB (Ports Database), http:\/\/www.portsdb.org (Accessed 05\/30\/2004)"},{"key":"9_CR29","doi-asserted-by":"crossref","unstructured":"Labrou, Y., Finin, T., Peng, Y.: Agent communication languages: The current landscape. IEEE Intelligent Systems, 45\u201352 (March\/April 1999)","DOI":"10.1109\/5254.757631"}],"container-title":["Lecture Notes in Computer Science","Information Networking. Convergence in Broadband and Mobile Networking"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-30582-8_9.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,18]],"date-time":"2020-11-18T23:24:57Z","timestamp":1605741897000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-30582-8_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540244677","9783540305828"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-30582-8_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}