{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T03:14:10Z","timestamp":1761707650141},"reference-count":36,"publisher":"Elsevier BV","issue":"1","license":[{"start":{"date-parts":[[2004,2,1]],"date-time":"2004-02-01T00:00:00Z","timestamp":1075593600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computers &amp; Security"],"published-print":{"date-parts":[[2004,2]]},"DOI":"10.1016\/s0167-4048(04)00068-9","type":"journal-article","created":{"date-parts":[[2004,2,24]],"date-time":"2004-02-24T10:15:49Z","timestamp":1077617749000},"page":"31-42","source":"Crossref","is-referenced-by-count":7,"title":["Mitigation of network tampering using dynamic dispatch of mobile agents"],"prefix":"10.1016","volume":"23","author":[{"given":"Ronald F","family":"DeMara","sequence":"first","affiliation":[]},{"given":"Adam J","family":"Rocke","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S0167-4048(04)00068-9_BIB37","series-title":"Proceedings of the Second Usenix Workshop on Electronic Commerce","first-page":"1","article-title":"Tamper resistance\u2014a cautionary note","author":"Anderson","year":"1996"},{"key":"10.1016\/S0167-4048(04)00068-9_BIB12","unstructured":"Anderson R, Bozek T, Logstaff T, Meitzler W, Skroch M, Wyk KV. Research on mitigating the insider thread to information systems. Workshop Proceedings, RAND Corporation Report CF-163."},{"issue":"3","key":"10.1016\/S0167-4048(04)00068-9_BIB14","doi-asserted-by":"crossref","first-page":"186","DOI":"10.1145\/357830.357849","article-title":"The base-rate fallacy and the difficulty of intrusion detection","volume":"3","author":"Axelsson","year":"2000","journal-title":"ACM Trans Inform Syst Secur (TISSEC)"},{"key":"10.1016\/S0167-4048(04)00068-9_BIB27","series-title":"Proceedings International Symposium on Software Engineering for Parallel and Distributed Systems","first-page":"158","article-title":"Implementation of an intrusion detection system based on mobile agents","author":"Bernardes","year":"2000"},{"key":"10.1016\/S0167-4048(04)00068-9_BIB36","series-title":"Proceedings of the Reliability and Maintainability Symposium","first-page":"230","article-title":"Evaluating the risk of industrial espionage","author":"Bott","year":"1999"},{"key":"10.1016\/S0167-4048(04)00068-9_BIB20","author":"Cashin"},{"key":"10.1016\/S0167-4048(04)00068-9_BIB29","unstructured":"Coosta C. Tach design concept. Lockheed Martin Corporation."},{"key":"10.1016\/S0167-4048(04)00068-9_BIB15","doi-asserted-by":"crossref","first-page":"805","DOI":"10.1016\/S1389-1286(98)00017-6","article-title":"Towards a taxonomy of intrusion-detection systems","volume":"31","author":"Debar","year":"1999","journal-title":"Comput Netw"},{"key":"10.1016\/S0167-4048(04)00068-9_BIB38","unstructured":"DeMara RF, Rocke AJ. Confidant operational concept. Tech. Rep. TR-RFD2003-02, School of Electrical Engineering and Computer Science, University of Central Florida; 2003."},{"key":"10.1016\/S0167-4048(04)00068-9_BIB28","series-title":"Proceedings of 21st NIST\u2013NCSC National Information Systems Security Conference","first-page":"361","article-title":"A framework for cooperative intrusion detection","author":"Frincke","year":"1998"},{"key":"10.1016\/S0167-4048(04)00068-9_BIB7","author":"Fyodor"},{"key":"10.1016\/S0167-4048(04)00068-9_BIB11","series-title":"Computer Security Applications Conference, 1999","first-page":"219","article-title":"Policy meditation for multi-enterprise environments","author":"Galiasso","year":"1999"},{"key":"10.1016\/S0167-4048(04)00068-9_BIB4","doi-asserted-by":"crossref","unstructured":"Heady R, Luger G, Maccabe A, Servilla M. The architecture of a network level intrusion detection system. Master's thesis, Department of Computer Science, University of New Mexico; August 1990.","DOI":"10.2172\/425295"},{"key":"10.1016\/S0167-4048(04)00068-9_BIB26","author":"Helmer"},{"key":"10.1016\/S0167-4048(04)00068-9_BIB3","series-title":"Proceedings of the IEEE\u2013INNS\u2013ENNS International Joint Conference on Neural Networks, 2000","first-page":"411","article-title":"A computer host-based user anomaly detection system using the self-organizing map","volume":"vol. 5","author":"Hoglund","year":"2000"},{"key":"10.1016\/S0167-4048(04)00068-9_BIB35","unstructured":"Howard JD, Longstaff TA. A common language for computer security incidents. Sandia report SAND98-8667, Sandia National Laboratories; October 1998."},{"key":"10.1016\/S0167-4048(04)00068-9_BIB30","author":"IBM Research"},{"key":"10.1016\/S0167-4048(04)00068-9_BIB23","author":"Jansen"},{"key":"10.1016\/S0167-4048(04)00068-9_BIB13","series-title":"Proceedings of the 1998 Workshop on New Security Paradigms","first-page":"122","article-title":"Tolerating penetrations and insider attacks by requiring independent corroboration","author":"Kahn","year":"1998"},{"key":"10.1016\/S0167-4048(04)00068-9_BIB33","unstructured":"Kapoor B. Remote misuse detection system using mobile agents and relational database query techniques. Master's thesis, University of Central Florida; 2000."},{"key":"10.1016\/S0167-4048(04)00068-9_BIB6","doi-asserted-by":"crossref","unstructured":"Kim GH, Spafford EH. Experiences with tripwire: using integrity checkers for intrusion detection. Tech. Rep. CSD-TR-94-012, Department of Computer Sciences, Purdue University; 1994.","DOI":"10.1145\/191177.191183"},{"key":"10.1016\/S0167-4048(04)00068-9_BIB24","series-title":"ICSE Workshop on Software Engineering and Mobility","article-title":"Applying mobile agent technology to intrusion detection","author":"Kruegel","year":"2001"},{"issue":"1","key":"10.1016\/S0167-4048(04)00068-9_BIB25","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1145\/506128.506131","article-title":"Security in mobile agent system: problems and approaches","volume":"34","author":"Kun","year":"2000","journal-title":"ACM SIGOPS Operating Syst Rev"},{"key":"10.1016\/S0167-4048(04)00068-9_BIB9","author":"Lehti"},{"key":"10.1016\/S0167-4048(04)00068-9_BIB21","author":"Linden"},{"key":"10.1016\/S0167-4048(04)00068-9_BIB31","unstructured":"Lu J. Mobile agent protocols for distributed detection of network intrusions. Master's thesis, University of Central Florida; 2000."},{"key":"10.1016\/S0167-4048(04)00068-9_BIB5","series-title":"Proceedings of 1st USENIX Workshop on Intrusion Detection and Network Monitoring","first-page":"73","article-title":"Experience with EMERALD to date","author":"Neumann","year":"1999"},{"key":"10.1016\/S0167-4048(04)00068-9_BIB16","author":"Rauch"},{"key":"10.1016\/S0167-4048(04)00068-9_BIB17","author":"SANS Institute"},{"key":"10.1016\/S0167-4048(04)00068-9_BIB2","series-title":"DARPA Information Survivability Conference and Exposition, 2000","first-page":"3","article-title":"Infrastructure for intrusion detection and response","volume":"vol. 2","author":"Schnackenberg","year":"1999"},{"key":"10.1016\/S0167-4048(04)00068-9_BIB18","author":"Seifried"},{"issue":"4","key":"10.1016\/S0167-4048(04)00068-9_BIB8","doi-asserted-by":"crossref","first-page":"547","DOI":"10.1016\/S1389-1286(00)00136-5","article-title":"Intrusion detection using autonomous agents","volume":"34","author":"Spafford","year":"2000","journal-title":"Comput Netw"},{"key":"10.1016\/S0167-4048(04)00068-9_BIB34","unstructured":"Wang G. Mobile agent file integrity analyzer. Master's thesis, University of Central Florida; 2001."},{"key":"10.1016\/S0167-4048(04)00068-9_BIB22","author":"WetStone Technologies, Inc"},{"key":"10.1016\/S0167-4048(04)00068-9_BIB1","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1109\/65.484228","article-title":"Cooperating security managers: a peer-based intrusion detection system","author":"White","year":"1996","journal-title":"IEEE Netw"},{"key":"10.1016\/S0167-4048(04)00068-9_BIB32","unstructured":"Zhu Y. Decentralized control schemes for coordinating distributed processing activities of mobile software agents. Master's thesis, University of Central Florida; 2000."}],"container-title":["Computers &amp; Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167404804000689?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167404804000689?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,2,15]],"date-time":"2019-02-15T00:55:19Z","timestamp":1550192119000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0167404804000689"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004,2]]},"references-count":36,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2004,2]]}},"alternative-id":["S0167404804000689"],"URL":"https:\/\/doi.org\/10.1016\/s0167-4048(04)00068-9","relation":{},"ISSN":["0167-4048"],"issn-type":[{"value":"0167-4048","type":"print"}],"subject":[],"published":{"date-parts":[[2004,2]]}}}