{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:33:34Z","timestamp":1750307614799,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","license":[{"start":{"date-parts":[[2008,11,24]],"date-time":"2008-11-24T00:00:00Z","timestamp":1227484800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2008,11,24]]},"DOI":"10.1145\/1497308.1497445","type":"proceedings-article","created":{"date-parts":[[2009,9,28]],"date-time":"2009-09-28T17:33:43Z","timestamp":1254159223000},"page":"689-693","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["A secure mobile agents approach for anomalies detection on firewalls"],"prefix":"10.1145","author":[{"given":"Fakher Ben","family":"Ftima","sequence":"first","affiliation":[{"name":"University of Manouba"}]},{"given":"Kamel","family":"Karoui","sequence":"additional","affiliation":[{"name":"University of Manouba"}]},{"given":"Henda Ben","family":"Ghzela","sequence":"additional","affiliation":[{"name":"University of Manouba"}]}],"member":"320","published-online":{"date-parts":[[2008,11,24]]},"reference":[{"first-page":"50","volume-title":"IEEE Communications Magazine","author":"Bellovin M.","key":"e_1_3_2_1_1_1"},{"key":"e_1_3_2_1_2_1","volume-title":"IEEE Symposium on Computers and communications. ISCC","volume":"70","author":"Benelbahri A.","year":"2007"},{"key":"e_1_3_2_1_3_1","unstructured":"Cobb S. 1997. \"ICSA Firewall Policy Guide v2.0\". NCSA Security White Paper Series.  Cobb S. 1997. \"ICSA Firewall Policy Guide v2.0\". NCSA Security White Paper Series."},{"volume-title":"Proceedings of the International Conference Intelligent Systems and Agents (ISA08)","year":"2008","author":"Ben Ftima K.","key":"e_1_3_2_1_4_1"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/CRISIS.2008.4757484"},{"key":"e_1_3_2_1_6_1","unstructured":"Chapman D. and Zwicky E. 2000. Building Internet Firewalls Second Edition Orielly & Associates Inc.   Chapman D. and Zwicky E. 2000. Building Internet Firewalls Second Edition Orielly & Associates Inc."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"Chewsick W. and Belovin S. 1995. Firewalls and Internet Security Addison- Wesley.   Chewsick W. and Belovin S. 1995. Firewalls and Internet Security Addison- Wesley.","DOI":"10.1016\/1353-4858(95)90197-3"},{"key":"e_1_3_2_1_8_1","first-page":"800","article-title":"Guidelines on Firewalls and Firewall Policy\". NIST Recommendations","author":"Wack J.","year":"2002","journal-title":"SP"},{"key":"e_1_3_2_1_9_1","unstructured":"Bellovin M. 1999. Distributed Firewalls. Special Issue on Security ISSN 1044--6397.  Bellovin M. 1999. Distributed Firewalls. Special Issue on Security ISSN 1044--6397."},{"volume-title":"Proceedings of 6th Nordic Workshop on Secure IT-Systems (NordSec","year":"2001","author":"Eronen P.","key":"e_1_3_2_1_10_1"},{"key":"e_1_3_2_1_11_1","unstructured":"Al-Shaer E. Hamed H. 2004. \"Discovery of policy anomalies in distributed firewalls\". Sch. of Comput. Sci. Telecommun. & Inf. Syst. 2004 DePaul Univ USA.  Al-Shaer E. Hamed H. 2004. \"Discovery of policy anomalies in distributed firewalls\". Sch. of Comput. Sci. Telecommun. & Inf. Syst. 2004 DePaul Univ USA."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/352600.353052"},{"volume-title":"Proceedings of IEEE INFOCOM'00","author":"Hari B.","key":"e_1_3_2_1_13_1"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/295685.298136"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1017\/S0269888998002082"},{"key":"e_1_3_2_1_16_1","unstructured":"Karoui K. 2005. \"MA Overview\" published in ncyclopedia of Multimed ia Technology and Networking Idea Group.  Karoui K. 2005. \"MA Overview\" published in ncyclopedia of Multimed ia Technology and Networking Idea Group."},{"key":"e_1_3_2_1_17_1","unstructured":"Walsh T. N. Paciorek and D. Wong 1999. \"Mobility: Processes Computers and Agents\" Addison(Ed.) p:525--534.  Walsh T. N. Paciorek and D. Wong 1999. \"Mobility: Processes Computers and Agents\" Addison(Ed.) p:525--534."},{"key":"e_1_3_2_1_18_1","unstructured":"Algesheimer J. C. Cachin J. Cameniscsh and G. Karjoth 2000. \"Cryptographic Security for Mobile Code\". IBM Research Report Zurich Switzerland.  Algesheimer J. C. Cachin J. Cameniscsh and G. Karjoth 2000. \"Cryptographic Security for Mobile Code\". IBM Research Report Zurich Switzerland."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"Jansen W et al. 1999. \"Applying mobile agents to intrusion detection and response\". Technical report NIST Interim Report - 6416.  Jansen W et al. 1999. \"Applying mobile agents to intrusion detection and response\". Technical report NIST Interim Report - 6416.","DOI":"10.6028\/NIST.IR.6416"},{"key":"e_1_3_2_1_20_1","unstructured":"Karoui K. and B. Ftima F. 2007. \"Interaction Mobile Agents--Web Services\". Encycloped ia of multimedia Technology and Networking IGI global.  Karoui K. and B. Ftima F. 2007. \"Interaction Mobile Agents--Web Services\". Encycloped ia of multimedia Technology and Networking IGI global."},{"key":"e_1_3_2_1_21_1","unstructured":"Karoui K. and B. Ftima F. 2007. \"Effectiveness of Web Services-Mobile Agents Approach in E-commerce System\". Encyclopedia of Information Science and Technology IGI.  Karoui K. and B. Ftima F. 2007. \"Effectiveness of Web Services-Mobile Agents Approach in E-commerce System\". Encyclopedia of Information Science and Technology IGI."},{"volume-title":"Proc. Canadian Conf. Electrical and Computer Engineering (CCECE2003)","author":"El Rhazi A., S.","key":"e_1_3_2_1_22_1"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","unstructured":"R. Rivest \"The MD5 Message-Digest Algorithm\" RFC 1321 MIT LCS & RSA Data Security Inc. April 1992.   R. Rivest \"The MD5 Message-Digest Algorithm\" RFC 1321 MIT LCS & RSA Data Security Inc. April 1992.","DOI":"10.17487\/rfc1321"},{"key":"e_1_3_2_1_24_1","unstructured":"Toshiba Corporation .2001.Beegent Framework.  Toshiba Corporation .2001.Beegent Framework."},{"key":"e_1_3_2_1_25_1","unstructured":"Russell R. 1999. Linux iptables HOWTO v0.0.2.  Russell R. 1999. Linux iptables HOWTO v0.0.2."}],"event":{"name":"iiWAS08: 10th International Conference on Information Integration and Web-based Applications & Services","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"],"location":"Linz Austria","acronym":"iiWAS08"},"container-title":["Proceedings of the 10th International Conference on Information Integration and Web-based Applications &amp; Services"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1497308.1497445","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1497308.1497445","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:45:43Z","timestamp":1750250743000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1497308.1497445"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,11,24]]},"references-count":25,"alternative-id":["10.1145\/1497308.1497445","10.1145\/1497308"],"URL":"https:\/\/doi.org\/10.1145\/1497308.1497445","relation":{},"subject":[],"published":{"date-parts":[[2008,11,24]]},"assertion":[{"value":"2008-11-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}