{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:19:31Z","timestamp":1750306771364,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":8,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,4,4]],"date-time":"2013-04-04T00:00:00Z","timestamp":1365033600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"The Citadel Foundation"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,4,4]]},"DOI":"10.1145\/2498328.2500071","type":"proceedings-article","created":{"date-parts":[[2013,7,2]],"date-time":"2013-07-02T14:33:48Z","timestamp":1372775628000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["IMAIDS"],"prefix":"10.1145","author":[{"given":"Shankar M.","family":"Banik","sequence":"first","affiliation":[{"name":"The Citadel, Charleston, SC"}]},{"given":"Derek S.","family":"Bernsen","sequence":"additional","affiliation":[{"name":"The Citadel, Charleston, SC"}]},{"given":"Muhammad","family":"Javed","sequence":"additional","affiliation":[{"name":"Cameron University, Lawton, OK"}]}],"member":"320","published-online":{"date-parts":[[2013,4,4]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/844324.844326"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1198255.1198269"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065983.1066007"},{"key":"e_1_3_2_1_4_1","volume-title":"IACSIT International Journal of Engineering and Technology","author":"Ezumalai R.","year":"2010","unstructured":"R. Ezumalai , G. Aghila , R. Rajalakshmi , \" Design and Architecture for Efficient Load Balancing with Security using Mobile Agents\" , IACSIT International Journal of Engineering and Technology , Volume 2 , Number 1, February 2010 . R. Ezumalai, G. Aghila, R. Rajalakshmi, \"Design and Architecture for Efficient Load Balancing with Security using Mobile Agents\", IACSIT International Journal of Engineering and Technology, Volume 2, Number 1, February 2010."},{"key":"e_1_3_2_1_5_1","volume-title":"IEEE Network Operations and Management Systems Symposium","author":"Tripathi A.","year":"2002","unstructured":"A. Tripathi , T. Ahmed , S. Pathak , M. Carney , P. Dokas , \" Paradigms for Mobile Agent Based Active Monitoring of Network Systems\" , IEEE Network Operations and Management Systems Symposium 2002 . A. Tripathi, T. Ahmed, S. Pathak, M. Carney, P. Dokas, \"Paradigms for Mobile Agent Based Active Monitoring of Network Systems\", IEEE Network Operations and Management Systems Symposium 2002."},{"key":"e_1_3_2_1_6_1","volume-title":"21st National Information Systems Security Conference","author":"Frincke D.","year":"1998","unstructured":"D. Frincke , D. Tobin , J. McConnell , J. Marconi , D. Polla , \" A Framework for Cooperative Intrusion Detection\" , 21st National Information Systems Security Conference , October 1998 . D. Frincke, D. Tobin, J. McConnell, J. Marconi, D. Polla, \"A Framework for Cooperative Intrusion Detection\", 21st National Information Systems Security Conference, October 1998."},{"key":"e_1_3_2_1_7_1","volume-title":"12th Annual Canadian Information Technology Security Symposium","author":"Jansen W.","year":"2000","unstructured":"W. Jansen , P. Mell , T. Karygiannis , D. Marks , \" Mobile Agents in Intrusion Detection and Response\" , 12th Annual Canadian Information Technology Security Symposium , June 2000 . W. Jansen, P. Mell, T. Karygiannis, D. Marks, \"Mobile Agents in Intrusion Detection and Response\", 12th Annual Canadian Information Technology Security Symposium, June 2000."},{"key":"e_1_3_2_1_8_1","unstructured":"http:\/\/www.planet-lab.org  http:\/\/www.planet-lab.org"}],"event":{"name":"ACM SE'13: ACM Southeast Regional 2013","sponsor":["ACM Association for Computing Machinery"],"location":"Savannah Georgia","acronym":"ACM SE'13"},"container-title":["Proceedings of the 51st ACM Southeast Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2498328.2500071","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2498328.2500071","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:28:56Z","timestamp":1750231736000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2498328.2500071"}},"subtitle":["intelligent mobile agent-based intrusion detection system"],"short-title":[],"issued":{"date-parts":[[2013,4,4]]},"references-count":8,"alternative-id":["10.1145\/2498328.2500071","10.1145\/2498328"],"URL":"https:\/\/doi.org\/10.1145\/2498328.2500071","relation":{},"subject":[],"published":{"date-parts":[[2013,4,4]]},"assertion":[{"value":"2013-04-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}