iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.crossref.org/works/10.1007/11534310_128
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T18:22:24Z","timestamp":1725560544040},"publisher-location":"Berlin, Heidelberg","reference-count":7,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540281023"},{"type":"electronic","value":"9783540318682"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11534310_128","type":"book-chapter","created":{"date-parts":[[2005,9,27]],"date-time":"2005-09-27T13:48:30Z","timestamp":1127828910000},"page":"1227-1233","source":"Crossref","is-referenced-by-count":1,"title":["APA: An Interior-Oriented Intrusion Detection System Based on Multi-agents"],"prefix":"10.1007","author":[{"given":"Dechang","family":"Pi","sequence":"first","affiliation":[]},{"given":"Qiang","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Weiqi","family":"Li","sequence":"additional","affiliation":[]},{"given":"Jun","family":"Lv","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"128_CR1","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1016\/S0164-1212(02)00092-4","volume":"67","author":"G. Helmer","year":"2003","unstructured":"Helmer, G., Wong, J.S.K., Honavar, V., Miller, L., Wang, Y.: Lightweight agents for intrusion detection. The Journal of Systems and Software\u00a067, 109\u2013122 (2003)","journal-title":"The Journal of Systems and Software"},{"key":"128_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1007\/978-3-540-28651-6_38","volume-title":"Intelligent Data Engineering and Automated Learning \u2013 IDEAL 2004","author":"M.S. Shin","year":"2004","unstructured":"Shin, M.S., Kim, E.H., Ryu, K.H.: False Alarm Classification Model for Network-Based Intrusion Detection System. In: Yang, Z.R., Yin, H., Everson, R.M. (eds.) IDEAL 2004. LNCS, vol.\u00a03177, pp. 259\u2013265. Springer, Heidelberg (2004)"},{"key":"128_CR3","doi-asserted-by":"crossref","unstructured":"Kachirski, O., Guha, R.: Effective Intrusion Detection Using Multiple Sensors in Wireless Ad Hoc Networks. In: Proceedings of the 36th Hawaii International Conference on System Sciences, HICSS 2003 (2003) 0-7695-1874-5\/03","DOI":"10.1109\/HICSS.2003.1173873"},{"key":"128_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1007\/978-3-540-30204-9_27","volume-title":"Advances in Databases and Information Systems","author":"P. Ramasubramanian","year":"2004","unstructured":"Ramasubramanian, P., Kannan, A.: Intelligent Multi-agent Based Database Hybrid Intrusion Prevention System. In: Bencz\u00far, A.A., Demetrovics, J., Gottlob, G. (eds.) ADBIS 2004. LNCS, vol.\u00a03255, pp. 393\u2013408. Springer, Heidelberg (2004)"},{"key":"128_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1007\/3-540-44842-X_11","volume-title":"Computational Science and Its Applications - ICCSA 2003","author":"R.S. Puttini","year":"2003","unstructured":"Puttini, R.S., Percher, J.-M., M\u00e9, L.: A Modular Architecture for Distributed IDS in MANET. In: Kumar, V., Gavrilova, M.L., Tan, C.J.K., L\u2019Ecuyer, P. (eds.) ICCSA 2003. LNCS, vol.\u00a02669, pp. 91\u2013113. Springer, Heidelberg (2003)"},{"key":"128_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"206","DOI":"10.1007\/978-3-540-24768-5_22","volume-title":"Computational Science and Its Applications \u2013 ICCSA 2004","author":"S. Baik","year":"2004","unstructured":"Baik, S., Bala, J.: A Decision Tree Algorithm for Distributed Data Mining: Towards Network Intrusion Detection. In: Lagan\u00e1, A., Gavrilova, M.L., Kumar, V., Mun, Y., Tan, C.J.K., Gervasi, O. (eds.) ICCSA 2004. LNCS, vol.\u00a03046, pp. 206\u2013212. Springer, Heidelberg (2004)"},{"key":"128_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1007\/978-3-540-30143-1_6","volume-title":"Recent Advances in Intrusion Detection","author":"T. Pietraszek","year":"2004","unstructured":"Pietraszek, T.: Using Adaptive Alert Classification to Reduce False Positives in Intrusion Detection. In: Jonsson, E., Valdes, A., Almgren, M. (eds.) RAID 2004. LNCS, vol.\u00a03224, pp. 102\u2013124. Springer, Heidelberg (2004)"}],"container-title":["Lecture Notes in Computer Science","Networking and Mobile Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11534310_128.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T06:51:33Z","timestamp":1619506293000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11534310_128"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540281023","9783540318682"],"references-count":7,"URL":"https:\/\/doi.org\/10.1007\/11534310_128","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}