{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T09:08:32Z","timestamp":1725613712444},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,10]]},"DOI":"10.1109\/crisis.2008.4757484","type":"proceedings-article","created":{"date-parts":[[2009,1,20]],"date-time":"2009-01-20T21:03:38Z","timestamp":1232485418000},"page":"235-241","source":"Crossref","is-referenced-by-count":1,"title":["Firewalls anomalies&amp;#x2019; detection system based on web services \/ mobile agents interactions"],"prefix":"10.1109","author":[{"given":"Fakher Ben","family":"Ftima","sequence":"first","affiliation":[]},{"given":"Kamel","family":"Karoui","sequence":"additional","affiliation":[]},{"given":"Henda Ben","family":"Ghzela","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Beegent Multi-Agent Framework","year":"2001","key":"19"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-60566-014-1.ch097"},{"key":"18","article-title":"effectiveness of web services-mobile agents approach in e-commerce system","author":"karoui","year":"2007","journal-title":"Encyclopedia of Information Science and Technology"},{"journal-title":"White Paper","year":"2000","key":"15"},{"key":"16","article-title":"applying mobile agents to intrusion detection and response","author":"jansen","year":"1999","journal-title":"Technical report NIST Interim Report"},{"year":"0","key":"13"},{"journal-title":"Web Service description advertising and discovery WSDL and Beyond","year":"2001","author":"lemahieu","key":"14"},{"key":"11","article-title":"seven good reasons for mobile agents, 1999","author":"lange","year":"0","journal-title":"Communications of the ACM Issue"},{"year":"0","key":"12"},{"journal-title":"Data Communications Computer Networks and Open System","year":"1995","author":"longman","key":"21"},{"year":"0","key":"3"},{"year":"1999","author":"russell","key":"20"},{"year":"0","key":"2"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/35.312843"},{"key":"10","doi-asserted-by":"crossref","DOI":"10.1145\/352600.353052","article-title":"implementing a distributed firewall","author":"ioannidis","year":"2000","journal-title":"Proceedings of CCS'00"},{"key":"7","article-title":"distributed firewalls","author":"bellovin","year":"1999","journal-title":"Special Issue on Security"},{"key":"6","article-title":"guidelines on firewalls and firewall policy","author":"wack","year":"2002","journal-title":"NIST Recommendations"},{"journal-title":"Firewalls and Internet Security","year":"1995","author":"chewsick","key":"5"},{"journal-title":"Building Internet Firewalls","year":"2000","author":"chapman","key":"4"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2004.1354680"},{"key":"8","article-title":"an expert system for analyzing firewall rules","author":"eronen","year":"0","journal-title":"Procs of 6th Nordic Workshop on Secure IT-Systems (NordSec 2001)"}],"event":{"name":"2008 Third International Conference on Risks and Security of Internet and Systems( CRiSIS)","start":{"date-parts":[[2008,10,28]]},"location":"Tozeur, Tunisia","end":{"date-parts":[[2008,10,30]]}},"container-title":["2008 Third International Conference on Risks and Security of Internet and Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4733895\/4757450\/04757484.pdf?arnumber=4757484","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,18]],"date-time":"2017-06-18T15:56:48Z","timestamp":1497801408000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4757484\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,10]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/crisis.2008.4757484","relation":{},"subject":[],"published":{"date-parts":[[2008,10]]}}}