{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:32:35Z","timestamp":1750307555499,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2009,12,14]],"date-time":"2009-12-14T00:00:00Z","timestamp":1260748800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2009,12,14]]},"DOI":"10.1145\/1806338.1806464","type":"proceedings-article","created":{"date-parts":[[2010,5,25]],"date-time":"2010-05-25T13:08:24Z","timestamp":1274792904000},"page":"663-668","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Misconfigurations discovery between distributed security components using the mobile agent approach"],"prefix":"10.1145","author":[{"given":"Fakher Ben","family":"Ftima","sequence":"first","affiliation":[{"name":"University of Manouba"}]},{"given":"Kamel","family":"Karoui","sequence":"additional","affiliation":[{"name":"University of Manouba"}]},{"given":"Henda Ben","family":"Ghezala","sequence":"additional","affiliation":[{"name":"University of Manouba"}]}],"member":"320","published-online":{"date-parts":[[2009,12,14]]},"reference":[{"first-page":"1203","volume-title":"Detecting and Resolving Packet Filter Conflicts. In 19th Annual Joint Conference of the IEEE Computer and Communications Societies","author":"Adiseshu H.","key":"e_1_3_2_1_1_1"},{"key":"e_1_3_2_1_2_1","unstructured":"Al-Shaer E. and Hamed H. 2004. Discovery of policy anomalies in distributed firewalls. Sch. of Comput. Sci. Telecommun. &amp; Inf. Syst. DePaul Univ USA.  Al-Shaer E. and Hamed H. 2004. Discovery of policy anomalies in distributed firewalls. Sch. of Comput. Sci. Telecommun. &amp; Inf. Syst. DePaul Univ USA."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2005.854119"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2006.1607877"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"Bace R. and Mell P. 2001. Intrusion detection systems. Special Publication 8000631 National Institute of Statistics.  Bace R. and Mell P. 2001. Intrusion detection systems. Special Publication 8000631 National Institute of Statistics.","DOI":"10.6028\/NIST.SP.800-31"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"Benelbahri A. and Bouhoula A. 2007. Tuple Based Approach for Anomalies Detection within Firewall Filtering Rules. ISCC. 12th Volume 1--4 Page(s):63--70.  Benelbahri A. and Bouhoula A. 2007. Tuple Based Approach for Anomalies Detection within Firewall Filtering Rules. ISCC. 12th Volume 1--4 Page(s):63--70.","DOI":"10.1109\/ISCC.2007.4381486"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1017\/S0269888998002082"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1035429.1035434"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1497308.1497445"},{"volume-title":"Proceedings of the International Conference Intelligent Systems and Agents (ISA08)","year":"2008","author":"Ben Ftima","key":"e_1_3_2_1_11_1"},{"first-page":"154","volume-title":"Proceedings of the 2005 IASTED International Conference on Communication, Network and Information Security","author":"Cuppens F.","key":"e_1_3_2_1_12_1"},{"volume-title":"Proceedings of the 7th International Symposium on System and Information Security, Brazil.","author":"Cuppens F.","key":"e_1_3_2_1_13_1"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"Debar H. Dacier M. and Wespi A. 2000. A revised taxonomy for intrusion-detection systems'. Annales des T\u00e9l\u00e9communications p 55(7--8): 361--378.  Debar H. Dacier M. and Wespi A. 2000. A revised taxonomy for intrusion-detection systems'. Annales des T\u00e9l\u00e9communications p 55(7--8): 361--378.","DOI":"10.1007\/BF02994844"},{"volume-title":"Procs of 6th Nordic Workshop on Secure IT-Systems-NordSec.","author":"Eronen P.","key":"e_1_3_2_1_15_1"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/11875567_14"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/11863908_30"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-007-0045-7"},{"volume-title":"Analysis of Firewall Policy Rule Using Data Mining Techniques. 10th IEEE\/IFIP Network Operations and Management Symposium - (NOMS06)","author":"Golnabi K.","key":"e_1_3_2_1_19_1"},{"key":"e_1_3_2_1_20_1","unstructured":"Gula R. 2000. Correlating IDS Alerts with Vulnerability Information. Tunable Network Security.  Gula R. 2000. Correlating IDS Alerts with Vulnerability Information. Tunable Network Security."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"Jansen W et al. 1999. Applying mobile agents to intrusion detection and response. Technical report NIST Interim Report - 6416.  Jansen W et al. 1999. Applying mobile agents to intrusion detection and response. Technical report NIST Interim Report - 6416.","DOI":"10.6028\/NIST.IR.6416"},{"key":"e_1_3_2_1_22_1","unstructured":"Karoui K. 2005. MA Overview. Published in Encyclopedia of Multimedia Technology and Networking Idea Group.  Karoui K. 2005. MA Overview. Published in Encyclopedia of Multimedia Technology and Networking Idea Group."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","unstructured":"Karoui K. and B. Ftima F. 2009. Effectiveness of Web Services-Mobile Agents Approach in E-commerce System. Encyclopaedia of Information Science and Technology IGI.  Karoui K. and B. Ftima F. 2009. Effectiveness of Web Services-Mobile Agents Approach in E-commerce System. Encyclopaedia of Information Science and Technology IGI.","DOI":"10.4018\/978-1-60566-026-4.ch203"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/295685.298136"},{"key":"e_1_3_2_1_25_1","unstructured":"Northcutt S. 2002. Network Intrusion Detection: An analyst's Hand Book. New Riders Publishing third edition.  Northcutt S. 2002. Network Intrusion Detection: An analyst's Hand Book. New Riders Publishing third edition."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.5555\/1039834.1039864"},{"key":"e_1_3_2_1_27_1","unstructured":"Toshiba Corporation. 2001. Beegent Multi-Agent Framework.  Toshiba Corporation. 2001. Beegent Multi-Agent Framework."},{"volume-title":"Mobility: Processes Computers and Agents","year":"1999","author":"Walsh T.","key":"e_1_3_2_1_28_1"},{"key":"e_1_3_2_1_29_1","unstructured":"Welte H. and al. 2009. The netfilter project: firewalling nat and packet mangling for linux 2.4x and 2.6.x. Obtained through the Internet: http:\/\/www.netfilter.org\/{accessed 25\/05\/2009}.  Welte H. and al. 2009. The netfilter project: firewalling nat and packet mangling for linux 2.4x and 2.6.x. Obtained through the Internet: http:\/\/www.netfilter.org\/{accessed 25\/05\/2009}."},{"key":"e_1_3_2_1_30_1","unstructured":"Wood M. and Erlinger M. 2003. Intrusion Detection Message Exchange (IDMEF) requirements. Internet Engineering Task Force - IDWG.  Wood M. and Erlinger M. 2003. Intrusion Detection Message Exchange (IDMEF) requirements. Internet Engineering Task Force - IDWG."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1046290.1046321"}],"event":{"name":"iiWAS '09: 11th International Conference on Information Integration and Web-based Applications & Services","sponsor":["Johannes Kepler University","SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data"],"location":"Kuala Lumpur Malaysia","acronym":"iiWAS '09"},"container-title":["Proceedings of the 11th International Conference on Information Integration and Web-based Applications &amp; Services"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1806338.1806464","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1806338.1806464","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:23:44Z","timestamp":1750249424000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1806338.1806464"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,12,14]]},"references-count":30,"alternative-id":["10.1145\/1806338.1806464","10.1145\/1806338"],"URL":"https:\/\/doi.org\/10.1145\/1806338.1806464","relation":{},"subject":[],"published":{"date-parts":[[2009,12,14]]},"assertion":[{"value":"2009-12-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}