{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T03:09:17Z","timestamp":1729652957822,"version":"3.28.0"},"reference-count":30,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,4]]},"DOI":"10.1109\/cicybs.2011.5949411","type":"proceedings-article","created":{"date-parts":[[2011,7,13]],"date-time":"2011-07-13T15:55:21Z","timestamp":1310572521000},"page":"100-107","source":"Crossref","is-referenced-by-count":3,"title":["Multi agent systems on military networks"],"prefix":"10.1109","author":[{"given":"David L.","family":"Hancock","sequence":"first","affiliation":[]},{"given":"Gary B.","family":"Lamont","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref30","article-title":"Collaborative distributed intrusion detection","author":"locasto","year":"2004","journal-title":"Columbia University Tech Report"},{"article-title":"Using Covert Means to Establish Cybercraft Command and Control","year":"2009","author":"sevy","key":"ref10"},{"article-title":"Self organized multi agent swarms (SOMAS) for network security control","year":"2009","author":"holloway","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1570256.1570366"},{"key":"ref13","article-title":"MASON: A new multi-agent simulation toolkit","author":"luke","year":"2004","journal-title":"Proceedings of the 2004 SwarmFest Workshop"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/DEST.2010.5610614"},{"journal-title":"Self-Organization in Biological Systems","year":"2003","author":"camazine","key":"ref15"},{"key":"ref16","first-page":"45","article-title":"Self-organisation and emergence in MAS: An overview","volume":"30","author":"serugendo","year":"2006","journal-title":"Informatica"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.73.036104"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.38.364"},{"key":"ref19","first-page":"6","article-title":"Efficient packet matching for gigabit network intrusion detection using TCAMs","volume":"1","author":"gao","year":"2006","journal-title":"Advanced Information Networking and Applications 2006 AINA 2006 20th International Conference on"},{"journal-title":"Evolutionary Algorithms for Solving Multi-Objective Problems","year":"2007","author":"coello","key":"ref28"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"1392","DOI":"10.1016\/S0140-3664(02)00040-3","article-title":"Intrusion detection with mobile agents","volume":"25","author":"jansen","year":"2002","journal-title":"Computer Communications"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/544741.544807"},{"key":"ref3","article-title":"Defending a New Domain: The Pentagon's Cyberstrategy","author":"lynn","year":"2010","journal-title":"Foreign Affairs"},{"key":"ref6","article-title":"CyberCraft: Concept Linking NCW Principles with the Cyber Domain in an Urban Operational Environment","author":"phister","year":"2005","journal-title":"AFRL Information Directorate Report"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/BF02430363"},{"key":"ref5","article-title":"Intelligent mobile agents in the military domain","author":"mcgrath","year":"2000","journal-title":"Proceedings of the Fourth International Conference on Autonomous Agents"},{"article-title":"Use of Trust Vectors in Support of the CyberCraft Initiative","year":"2007","author":"stevens","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/CISDA.2007.368153"},{"journal-title":"Capability of the People's Republic of China to Conduct Cyber Warfare and Network Exploitation","year":"2009","author":"krekel","key":"ref2"},{"article-title":"Developing a Reference Framework for Cybercraft Trust Evaluation","year":"2008","author":"hunt","key":"ref9"},{"key":"ref1","doi-asserted-by":"crossref","DOI":"10.21236\/ADA406255","author":"alberts","year":"2000","journal-title":"Network Centric Warfare Developing and Leveraging Information Superiority"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"439","DOI":"10.1007\/978-3-540-24852-1_32","article-title":"A parallel intrusion detection system for high-speed networks","author":"lai","year":"2004","journal-title":"Applied Cryptography and Network Security"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/1177080.1177101"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2010.032210.00054"},{"key":"ref24","first-page":"133","article-title":"Camnep: Agent-based network intrusion detection system","author":"rehak","year":"2008","journal-title":"Proc of 7th Int Conf on Autonomous Agents and Multiagent Systems (AA-MAS 2008)- Industry and Applications Track"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"165","DOI":"10.1145\/1177080.1177102","author":"mai","year":"2006","journal-title":"Proceedings of the 6th ACM SIGCOMM Conference on Internet measurement"},{"article-title":"Multi agent system for flow-based network attack classification","year":"2011","author":"hancock","key":"ref26"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-79232-1_7"}],"event":{"name":"2011 IEEE Symposium On Computational Intelligence In Cyber Security - Part Of 17273 - 2011 Ssci","start":{"date-parts":[[2011,4,11]]},"location":"Paris, France","end":{"date-parts":[[2011,4,15]]}},"container-title":["2011 IEEE Symposium on Computational Intelligence in Cyber Security (CICS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5937004\/5949383\/05949411.pdf?arnumber=5949411","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,28]],"date-time":"2021-11-28T01:02:56Z","timestamp":1638061376000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5949411\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,4]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/cicybs.2011.5949411","relation":{},"subject":[],"published":{"date-parts":[[2011,4]]}}}