{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,24]],"date-time":"2025-04-24T04:44:33Z","timestamp":1745469873216,"version":"3.40.4"},"reference-count":27,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,10]]},"DOI":"10.1109\/icsmc.2012.6377991","type":"proceedings-article","created":{"date-parts":[[2012,12,18]],"date-time":"2012-12-18T21:52:04Z","timestamp":1355867524000},"page":"1755-1760","source":"Crossref","is-referenced-by-count":0,"title":["Detection of emergent behavior for internet filtering systems"],"prefix":"10.1109","author":[{"given":"Mohammad","family":"Moshirpour","sequence":"first","affiliation":[]},{"given":"Payman","family":"Mohassel","sequence":"additional","affiliation":[]},{"given":"Armin","family":"Eberlein","sequence":"additional","affiliation":[]},{"given":"Behrouz H.","family":"Far","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Model-Based Detection of Emergent Behavior in Distributed and Multi-Agent Systems from Component Level Perspective","year":"2011","author":"moshirpour","key":"19"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1142\/S0129054102000935"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-35570-2_5"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/ICTAI.2010.29"},{"key":"16","article-title":"Model Based Detection of Implied Scenarios in Multi Agent Systems","author":"moshirpour","year":"0","journal-title":"Proceedings of the International Conference on Information Reuse and Integration Las Vegas USA 2010"},{"key":"13","article-title":"Safe realizability of high-level message sequence charts","volume":"177 192","author":"lohrey","year":"2002","journal-title":"CONCUR"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1142\/S0218194012400104"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5462124"},{"journal-title":"OpenNet Initiative Bulletin 005","article-title":"Probing Chinese search engine filtering","year":"2004","key":"12"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1145\/337180.337217"},{"journal-title":"Inference of Emergent Behaviors of Scenario-Based Specifications","year":"2009","author":"mousavi","key":"20"},{"key":"22","first-page":"335","article-title":"Casual Closure for MSC Languages","author":"adsul","year":"2005","journal-title":"FSTTCS"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2003.1214326"},{"key":"24","article-title":"Detecting implied scenarios analyzing nonlocal branching choices","author":"muccini","year":"0","journal-title":"FASE 2003 Warsaw Poland"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1145\/587051.587069"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1007\/1-84628-271-3_6"},{"journal-title":"Demonstrating the Impact and Benefits of CMMI An Update and Preliminary Results","year":"2003","author":"goldenson","key":"27"},{"journal-title":"ITU Message Sequence Charts Recommendation International Telecommunication Union","year":"1992","key":"3"},{"key":"2","first-page":"273","article-title":"Ignoring the Great Firewall of China","author":"clayton","year":"2007","journal-title":"I\/S A Journal of law and Policy for the Information Society"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/CSSE.2008.1453"},{"journal-title":"Software Tools for Safe Internet Access","year":"2011","key":"1"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1007\/11767831_6"},{"key":"6","first-page":"1","article-title":"Measuring Global Internet Filtering","author":"faris","year":"2008","journal-title":"Access Denied The Practice and Policy of Global Internet Filtering"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/ICSMC.2011.6084038"},{"journal-title":"Unified Modeling Language Specification Version 2 Available from Rational Software Corporation","year":"2006","key":"4"},{"key":"9","first-page":"268","article-title":"Enhance network security with dynamic packet filter","author":"julkunen","year":"0","journal-title":"Computer Communications and Networks Lafayette la 1998"},{"key":"8","doi-asserted-by":"crossref","first-page":"57","DOI":"10.7551\/mitpress\/7617.003.0006","article-title":"Tools and Technology of Internet Filtering","author":"murdoch","year":"2008","journal-title":"Access Denied The Practice and Policy of Global Internet Filtering"}],"event":{"name":"2012 IEEE International Conference on Systems, Man and Cybernetics - SMC","start":{"date-parts":[[2012,10,14]]},"location":"Seoul, Korea (South)","end":{"date-parts":[[2012,10,17]]}},"container-title":["2012 IEEE International Conference on Systems, Man, and Cybernetics (SMC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6362338\/6377652\/06377991.pdf?arnumber=6377991","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,23]],"date-time":"2025-04-23T21:49:23Z","timestamp":1745444963000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6377991\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,10]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/icsmc.2012.6377991","relation":{},"subject":[],"published":{"date-parts":[[2012,10]]}}}