{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T19:44:21Z","timestamp":1725565461695},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642133640"},{"type":"electronic","value":"9783642133657"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-13365-7_6","type":"book-chapter","created":{"date-parts":[[2010,9,10]],"date-time":"2010-09-10T12:40:54Z","timestamp":1284122454000},"page":"51-63","source":"Crossref","is-referenced-by-count":2,"title":["Intrusion Correlation Using Ontologies and Multi-agent Systems"],"prefix":"10.1007","author":[{"given":"Gustavo","family":"Isaza","sequence":"first","affiliation":[]},{"given":"Andr\u00e9s","family":"Castillo","sequence":"additional","affiliation":[]},{"given":"Marcelo","family":"L\u00f3pez","sequence":"additional","affiliation":[]},{"given":"Luis","family":"Castillo","sequence":"additional","affiliation":[]},{"given":"Manuel","family":"L\u00f3pez","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"6_CR1","first-page":"419","volume-title":"Intrusion detection alarms reduction using root cause analysis and clustering","author":"S. Al-Mamory","year":"2009","unstructured":"Al-Mamory, S., Zhang, H.: Intrusion detection alarms reduction using root cause analysis and clustering, pp. 419\u2013430. Butterworth-Heinemann, Butterworths (2009)"},{"key":"6_CR2","unstructured":"Undercoffer, J., Finin, T., Joshi, A., Pinkston, J.: A target centric ontology for intrusion detection: using DAML+OIL to classify intrusive behaviors. Knowledge Engineering Review - Special Issue on Ontologies for Distributed Systems, 2\u201322 (2005)"},{"key":"6_CR3","unstructured":"Mandujano, S., Galvan, A., Nolazco, J.: An ontology-based multiagent approach to outbound intrusion detection. In: The 3rd ACS\/IEEE International Conference on Computer Systems and Applications, p. 94 (2005)"},{"key":"6_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1007\/978-3-540-39718-2_22","volume-title":"The Semantic Web - ISWC 2003","author":"G. Denker","year":"2003","unstructured":"Denker, G., Kagal, L., Finin, T., Paolucci, M., et al.: Security for DAML Web Services: Annotation and Matchmaking. In: Fensel, D., Sycara, K., Mylopoulos, J. (eds.) ISWC 2003. LNCS, vol.\u00a02870, pp. 335\u2013350. Springer, Heidelberg (2003)"},{"key":"6_CR5","doi-asserted-by":"crossref","unstructured":"Raskin, V., Hempelmann, C.C.F., Triezenberg, K., Nirenburg, A.: Ontology in Information Security: A Useful Theoretical Foundation and Methodological Tool. In: Proceedings of the 2001 Workshop on New Security Paradigms (NSPW 2001), pp. 53\u201359 (2001)","DOI":"10.1145\/508171.508180"},{"key":"6_CR6","doi-asserted-by":"crossref","unstructured":"Cuppens-Boulahia, N., Cuppens, F., Lopez de Vergara, J.E., Vazquez, E., et al.: An ontology-based approach to react to network attacks. In: Third International Conference on Risks and Security of Internet and Systems, CRiSIS 2008, pp. 27\u201335 (2008) (on Publication)","DOI":"10.1109\/CRISIS.2008.4757461"},{"key":"6_CR7","unstructured":"Goldman, R., Harp, S.: Model-based Intrusion Assessment in Common Lisp. In: International Lisp Conference, 2009. Association of Lisp Users and ACM SIGPLAN, Cambridge (2009)"},{"key":"6_CR8","unstructured":"Balasubramaniyan, J., Garcia-Fernandez, J., Spafford, E., Zamboni, D.: An Architecture for Intrusion Detection using Autonomous Agents. Department of Computer Sciences. Purdue University, West Lafayette (1998)"},{"key":"6_CR9","volume-title":"Proceedings of the 2007 IEEE\/WIC\/ACM International Conference on Intelligent Agent Technology","author":"V. Krmicek","year":"2007","unstructured":"Krmicek, V., Celeda, P., Rehak, M., Pechoucek, M.: Agent-Based Network Intrusion Detection System. In: Proceedings of the 2007 IEEE\/WIC\/ACM International Conference on Intelligent Agent Technology. IEEE Computer Society, Los Alamitos (2007)"},{"key":"6_CR10","first-page":"1803","volume-title":"Autonomous decision on intrusion detection with trained BDI agents","author":"A. Orfila","year":"2008","unstructured":"Orfila, A., Carbo, J., Ribagorda, A.: Autonomous decision on intrusion detection with trained BDI agents, pp. 1803\u20131813. Butterworth-Heinemann, Butterworths (2008)"},{"key":"6_CR11","unstructured":"Lips, R., El-Kadhi, N.: Intelligent Mobile Agent for Intrusion Detection System (IMAIDS), European Institute of Technology. rue Pasteur - 94270, Le Kremlin-France (2008)"},{"key":"6_CR12","doi-asserted-by":"publisher","first-page":"320","DOI":"10.1007\/978-3-540-74972-1_42","volume-title":"Innovations in Hybrid Intelligent Systems. ASC","author":"A. Herrero","year":"2008","unstructured":"Herrero, A., Corchado, E., Pellicer, M., Abraham, A.: Hybrid Multi Agent-Neural Network Intrusion Detection with Mobile Visualization. In: Corchado, E. (ed.) Innovations in Hybrid Intelligent Systems. ASC, vol.\u00a044, pp. 320\u2013328. Springer, Heidelberg (2008)"},{"key":"6_CR13","first-page":"114","volume-title":"Modeling intrusion detection system using hybrid intelligent systems","author":"P. Sandhya","year":"2007","unstructured":"Sandhya, P., Ajith, A., Crina, G., Johnson, T.: Modeling intrusion detection system using hybrid intelligent systems, pp. 114\u2013132. Academic Press Ltd., London (2007)"},{"key":"6_CR14","unstructured":"Zurutuza, U., Uribeetxeberria, R., Azketa, E., Gil, G., et al.: Combined Data Mining Approach for Intrusion Detection. In: International Conference on Security and Criptography, Barcelona, Spain (2008)"},{"key":"6_CR15","unstructured":"IETF-IDMEF. he Intrusion Detection Message Exchange Format (IDMEF) (2007), \n \n http:\/\/www.ietf.org\/rfc\/rfc4765.txt\n \n \n (Consulted: Febrero 2008)"},{"key":"6_CR16","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"142","DOI":"10.1007\/978-3-540-32253-5_9","volume-title":"Law and the Semantic Web","author":"O. Corcho","year":"2005","unstructured":"Corcho, O., L\u00f3pez, M., G\u00f3mez-P\u00e9rez, A., L\u00f3pez-Cima, A.: Building Legal Ontologies with METHONTOLOGY and WebODE. In: Benjamins, V.R., Casanovas, P., Breuker, J., Gangemi, A. (eds.) Law and the Semantic Web. LNCS (LNAI), vol.\u00a03369, pp. 142\u2013157. Springer, Heidelberg (2005)"},{"key":"6_CR17","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1007\/978-3-642-04091-7_14","volume-title":"2nd International Workshop on Computational Intelligence in Security for Information Systems, CISIS 2009","author":"G. Isaza","year":"2009","unstructured":"Isaza, G., Castillo, A., Lopez, M., Castillo, L.: Towards Ontology-based intelligent model for Intrusion Detection and Prevention. In: 2nd International Workshop on Computational Intelligence in Security for Information Systems, CISIS 2009, pp. 109\u2013116. Springer, Heidelberg (2009)"},{"key":"6_CR18","first-page":"43","volume-title":"The description logic handbook: theory, implementation, and applications","author":"F. Baader","year":"2003","unstructured":"Baader, F., Nutt, W.: Basic description logics. In: The description logic handbook: theory, implementation, and applications, pp. 43\u201395. Cambridge University Press, Cambridge (2003)"},{"key":"6_CR19","unstructured":"DARPA. DARPA Intrusion Detection Evaluation, The 1999 DARPA off-line intrusion detection evaluation, LINCOLN LABORATORY Massachusetts Institute of Technology, \n \n http:\/\/www.ll.mit.edu\/IST\/ideval\/data\/1999\/1999_data_index.html\n \n \n (Consulted 2008)"},{"issue":"5","key":"6_CR20","first-page":"391","volume":"26","author":"X. Vila","year":"2007","unstructured":"Vila, X., Schustera, A., Riera, A.: Security for a Multi-Agent System based on JADE. Computers and Security. Science Direct\u00a026(5), 391\u2013400 (2007)","journal-title":"Science Direct"},{"key":"6_CR21","unstructured":"Friedman-Hill, E., Sandia, L.: Jess, The Rule Engine for Java Platform (2009), \n \n http:\/\/www.jessrules.com\/jess\/docs\/index.shtml\n \n \n (Consulted 2009)"},{"key":"6_CR22","unstructured":"Cuppens, F., Mi\u00e8ge, A.: Alert Correlation in a Cooperative Intrusion Detection Framework. In: IEEE Symposium on Security and Privacy, Oakland, May 12 - 15 (2002)"},{"key":"6_CR23","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1007\/978-3-642-00487-2_25","volume-title":"7th International Conference on Practical Applications of Agents and Multi-Agent Systems (PAAMS 2009). AISC","author":"G. Isaza","year":"2009","unstructured":"Isaza, G., Castillo, A., Duque, N.: An Intrusion Detection and Prevention Model Based on Intelligent Multi-Agent Systems, Signatures and Reaction Rules Ontologies. In: 7th International Conference on Practical Applications of Agents and Multi-Agent Systems (PAAMS 2009). AISC, vol.\u00a055, pp. 237\u2013245. Springer, Heidelberg (2009)"}],"container-title":["Communications in Computer and Information Science","Information Security and Assurance"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-13365-7_6.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,30]],"date-time":"2021-04-30T12:02:10Z","timestamp":1619784130000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-13365-7_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642133640","9783642133657"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-13365-7_6","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2010]]}}}