{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T02:44:54Z","timestamp":1729651494180,"version":"3.28.0"},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/aiccsa.2005.1387085","type":"proceedings-article","created":{"date-parts":[[2005,4,1]],"date-time":"2005-04-01T15:16:50Z","timestamp":1112368610000},"page":"494-501","source":"Crossref","is-referenced-by-count":5,"title":["An ontology-based multiagent architecture for outbound intrusion detection"],"prefix":"10.1109","author":[{"given":"S.","family":"Mandujano","sequence":"first","affiliation":[]},{"given":"A.","family":"Galvan","sequence":"additional","affiliation":[]},{"given":"J.A.","family":"Nolazco","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","article-title":"A target centric ontology for intrusion detection: Using DAML+OIL to classify intrusive behaviors","author":"undercoffer","year":"2004","journal-title":"Knowledge Engineering Review"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/605397.605403"},{"key":"18","article-title":"The common intrusion detection framework (CIDF)","author":"staniford-chen","year":"1998","journal-title":"Information Survivability Workshop"},{"key":"15","first-page":"361","article-title":"A framework for cooperative intrusion detection","author":"polla","year":"1998","journal-title":"20th Nat l Information Systems Security Conf"},{"journal-title":"Computer Crime & Security Survey '03","year":"2003","author":"richardson","key":"16"},{"key":"13","article-title":"Attack modeling for information security and survivability","volume":"sei 2001 tn 1","author":"moore","year":"2001","journal-title":"Technical Report"},{"journal-title":"Network Intrusion Detection","year":"2002","author":"northcutt","key":"14"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/AICCSA.2005.1387085"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/52.877859"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.1998.738563"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(00)00136-5"},{"key":"2","article-title":"State of the practice of intrusion detection technologies","author":"allen","year":"2000","journal-title":"Technical Report 99-TR-028"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2003.1254330"},{"key":"10","first-page":"749","article-title":"ODISET: Online distributed session tracing using agents","author":"mandujano","year":"2003","journal-title":"18th International Joint Conference on Artificial Intelligence IJCAI '03"},{"key":"7","article-title":"Mobile agents in intrusion detection and response","author":"jansen","year":"2000","journal-title":"12th Annual Canadian Information Technology Security Symposium"},{"key":"6","article-title":"AINT misbehaving: A taxonomy of anti-intrusion techniques","author":"halme","year":"1995","journal-title":"18th NISSC"},{"key":"5","article-title":"Intrusion detection message exchange format","author":"curry","year":"2004","journal-title":"Intrusion Detection Working Group - Internet Engineering Task Force Internet Draft"},{"key":"4","article-title":"Defending a computer system using autonomous agents","author":"crosbie","year":"1995","journal-title":"National Information Systems Security Conference"},{"key":"9","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-45482-9","article-title":"A data mining and cidf based approach for detecting novel and distributed intrusions","volume":"1907","author":"lee","year":"2000","journal-title":"Lecture Notes in Computer Science"},{"journal-title":"Classification and detection of computer intrusions","year":"1995","author":"kumar","key":"8"}],"event":{"name":"The 3rd ACS\/IEEE International Conference onComputer Systems and Applications, 2005.","location":"Cairo, Egypt"},"container-title":["The 3rd ACS\/IEEE International Conference onComputer Systems and Applications, 2005."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/9525\/30191\/01387085.pdf?arnumber=1387085","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,16]],"date-time":"2017-06-16T13:53:12Z","timestamp":1497621192000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1387085\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/aiccsa.2005.1387085","relation":{},"subject":[]}}