{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T09:51:18Z","timestamp":1725789078728},"reference-count":41,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,1]]},"DOI":"10.1109\/comsnets.2011.5716431","type":"proceedings-article","created":{"date-parts":[[2011,2,18]],"date-time":"2011-02-18T14:10:46Z","timestamp":1298038246000},"page":"1-10","source":"Crossref","is-referenced-by-count":6,"title":["Defeating the insider threat via autonomic network capabilities"],"prefix":"10.1109","author":[{"given":"F M","family":"Sibai","sequence":"first","affiliation":[]},{"given":"D A","family":"Menasce","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"2010","key":"ref39","article-title":"Google App Engine, Google, Inc"},{"year":"2010","key":"ref38","article-title":"Amazon EC 2, Amazon Web Services LLC"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2005.854122"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/DISCEX.2001.932217"},{"key":"ref31","first-page":"29","article-title":"Towards an autonomic security system for mobile ad hoc networks","author":"aljnidi","year":"0","journal-title":"Information Assurance and Security 2007 IAS 2007 Third International Symposium on"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/11908852_15"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ICAS.2006.13"},{"journal-title":"Lumension application control Lumension Security Inc","year":"2010","key":"ref36"},{"journal-title":"Cisco NAC Cisco Systems Inc","year":"2010","key":"ref35"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/DASC.2006.32"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/EDOC.2007.45"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/DISCEX.2003.1194975"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/1380584.1380585"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1626195.1626248"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/SECURWARE.2009.35"},{"journal-title":"http \/\/www snort org\/snort","article-title":"Snort, Sourcefire, Inc","year":"2010","key":"ref14"},{"journal-title":"Tripwire enterprise Tripwire Inc","year":"2010","key":"ref15"},{"journal-title":"Cisco Secure Agent Cisco Systems Inc","year":"2010","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICAS.2010.22"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24767-8_94"},{"year":"2010","key":"ref19","article-title":"Vsftpd"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICAC.2008.24"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2003.1160055"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/DISCEX.2003.1194902"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICAS.2008.49"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1147\/sj.421.0107"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4020-8737-0_81"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1147\/sj.421.0005"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CSE.2009.278"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1109\/ICSE.2005.1553533","article-title":"Research challenges of autonomic computing","author":"kephart","year":"2005","journal-title":"Proceedings 27th International Conference on Software Engineering 2005 ICSE 2005"},{"key":"ref2","first-page":"131","article-title":"Multi-Level Intrusion Detection System (ML-IDS)","author":"a1-nashif","year":"0","journal-title":"Proceedings of the 2008 Intl Conf on Autonomic Computing IEEE Computer Society"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/DISCEX.2001.932222"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1108\/09685221011079199"},{"year":"2010","key":"ref20","article-title":"viewSSLd"},{"year":"2010","key":"ref22","article-title":"Bro Intrusion Detection System, Lawrence Berkeley National Laboratory"},{"journal-title":"Netintercept Sandstorm Enterprises Inc","year":"2010","key":"ref21"},{"year":"2010","key":"ref24","article-title":"MySQL DB, Oracle Corporation"},{"journal-title":"Event Monitoring Enabling Responses to Anomalous Live Disturbances (EMERALD) SRI Intl","year":"2010","key":"ref23"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ICAC.2005.50"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/1052898.1052903"},{"year":"2010","key":"ref25","article-title":"BASE Project, Basic Analysis and Security Engine"}],"event":{"name":"2011 Third International Conference on Communication Systems and Networks (COMSNETS 2011)","start":{"date-parts":[[2011,1,4]]},"location":"Bangalore","end":{"date-parts":[[2011,1,8]]}},"container-title":["2011 Third International Conference on Communication Systems and Networks (COMSNETS 2011)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5710820\/5716386\/05716431.pdf?arnumber=5716431","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,19]],"date-time":"2017-06-19T15:57:43Z","timestamp":1497887863000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5716431\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,1]]},"references-count":41,"URL":"https:\/\/doi.org\/10.1109\/comsnets.2011.5716431","relation":{},"subject":[],"published":{"date-parts":[[2011,1]]}}}