{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T15:03:41Z","timestamp":1725807821709},"publisher-location":"Cham","reference-count":9,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319125671"},{"type":"electronic","value":"9783319125688"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-662-44980-6_34","type":"book-chapter","created":{"date-parts":[[2014,10,13]],"date-time":"2014-10-13T08:11:32Z","timestamp":1413187892000},"page":"303-311","source":"Crossref","is-referenced-by-count":0,"title":["A Formal Model for Attack Mutation Using Dynamic Description Logics"],"prefix":"10.1007","author":[{"given":"Zhuxiao","family":"Wang","sequence":"first","affiliation":[]},{"given":"Jing","family":"Guo","sequence":"additional","affiliation":[]},{"given":"Jin","family":"Shi","sequence":"additional","affiliation":[]},{"given":"Hui","family":"He","sequence":"additional","affiliation":[]},{"given":"Ying","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Hui","family":"Peng","sequence":"additional","affiliation":[]},{"given":"Guanhua","family":"Tian","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"34_CR1","unstructured":"Ptacek, T.H., Newsham, T.N.: Insertion, evasion, and denial of service: Eluding network intrusion detection. Secure Networks INC Calgary Alberta (1998)"},{"key":"34_CR2","unstructured":"Handley, M., Paxson, V., Kreibich, C.: Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-End Protocol Semantics. In: USENIX Security Symposium 2001, pp. 115\u2013131 (2001)"},{"key":"34_CR3","unstructured":"Niemi, O.P.: Protect Against Advanced Evasion Techniques, McAfee (2014), \n \n http:\/\/www.mcafee.com\/us\/resources\/white-papers\/wp-protect-against-adv-evasion-techniques.pdf"},{"key":"34_CR4","doi-asserted-by":"crossref","unstructured":"Chang, L., Shi, Z., Gu, T., Zhao, L.: A Family of Dynamic Description Logics for Representing and Reasoning About Action. J. Autom. Reasoning, 1\u201352 (2010)","DOI":"10.1007\/s10817-010-9210-1"},{"key":"34_CR5","doi-asserted-by":"publisher","first-page":"248","DOI":"10.3724\/SP.J.1001.2010.03793","volume":"21","author":"Z. Wang","year":"2010","unstructured":"Wang, Z., Yang, K., Shi, Z.: Failure Diagnosis of Internetware Systems Using Dynamic Description Logic. J. Softw. China\u00a021, 248\u2013260 (2010)","journal-title":"J. Softw. China"},{"key":"34_CR6","series-title":"IFIP AICT","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1007\/978-3-642-32891-6_21","volume-title":"Intelligent Information Processing VI","author":"Z. Wang","year":"2012","unstructured":"Wang, Z., Peng, H., Guo, J., Zhang, Y., Wu, K., Xu, H., Wang, X.: An architecture description language based on dynamic description logics. In: Shi, Z., Leake, D., Vadera, S. (eds.) Intelligent Information Processing VI. IFIP AICT, vol.\u00a0385, pp. 157\u2013166. Springer, Heidelberg (2012)"},{"key":"34_CR7","unstructured":"Baader, F., Calvanese, D., McGuinness, D., Nardi, D., Patel-Schneider, P.F.: The description logic handbook: theory, implementation, and applications. Cambridge University Press (2003)"},{"key":"34_CR8","doi-asserted-by":"crossref","first-page":"463","DOI":"10.1613\/jair.516","volume":"9","author":"A. Artale","year":"1998","unstructured":"Artale, A., Franconi, E.: A temporal description logic for reasoning about actions and plans. J. Artif. Intell. Res. USA\u00a09, 463\u2013506 (1998)","journal-title":"J. Artif. Intell. Res. USA"},{"key":"34_CR9","first-page":"572","volume":"2","author":"F. Baader","year":"2005","unstructured":"Baader, F., Lutz, C., Milicic, M., Sattler, U., Wolter, F.: Integrating description logics and action formalisms: First results. Proc. Natl. Conf. Artif. Intell. USA\u00a02, 572\u2013577 (2005)","journal-title":"Proc. Natl. Conf. Artif. Intell. USA"}],"container-title":["Lecture Notes in Computer Science","Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-44980-6_34","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,27]],"date-time":"2019-05-27T23:54:04Z","timestamp":1559001244000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-662-44980-6_34"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319125671","9783319125688"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-44980-6_34","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}