{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T00:21:25Z","timestamp":1729642885686,"version":"3.28.0"},"reference-count":11,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1109\/cimca.2006.56","type":"proceedings-article","created":{"date-parts":[[2007,1,10]],"date-time":"2007-01-10T15:53:11Z","timestamp":1168444391000},"page":"26-26","source":"Crossref","is-referenced-by-count":1,"title":["AWide Area Log Analyzing System Based on Mobile Agents"],"prefix":"10.1109","author":[{"given":"Takashi","family":"Katoh","sequence":"first","affiliation":[]},{"given":"Hiroki","family":"Kuzuno","sequence":"additional","affiliation":[]},{"given":"Takuya","family":"Kawahara","sequence":"additional","affiliation":[]},{"given":"Atsumu","family":"Watanabe","sequence":"additional","affiliation":[]},{"given":"Yushi","family":"Nakai","sequence":"additional","affiliation":[]},{"given":"Bhed","family":"Bista","sequence":"additional","affiliation":[]},{"given":"Toyoo","family":"Takata","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","doi-asserted-by":"crossref","DOI":"10.3233\/JCS-1999-7103","article-title":"NetSTAT: A network-based intrusion detection system","volume":"7","author":"vigna","year":"1999","journal-title":"Journal of Computer Security"},{"key":"2","first-page":"74","article-title":"Expert systems in intrusion detection: A case study","author":"sebring","year":"1988","journal-title":"Eleventh National Computer Security Conference"},{"year":"0","key":"10"},{"year":"0","key":"1"},{"key":"7","article-title":"Applying mobile agent technology to intrusion detection","author":"kru?gel","year":"2001","journal-title":"ICSE Workshop on Software Engineering and Mobility"},{"key":"6","doi-asserted-by":"crossref","DOI":"10.1016\/S0140-3664(02)00040-3","article-title":"Intrusion detection with mobile agents","author":"jansen","year":"2002","journal-title":"Computer Communications"},{"key":"5","article-title":"Mobile agents in intrusion detection and response","author":"jansen","year":"2000","journal-title":"12th Annual Canadian Information Technology Security Symposium"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1016\/S1571-0661(04)80336-0"},{"journal-title":"Internet Storm Center","year":"0","key":"9"},{"journal-title":"Dshield org Distributed Intrusion Detection System","year":"0","key":"8"},{"journal-title":"Internet scan data acquisition system","year":"0","key":"11"}],"event":{"name":"2006 International Conference on Computational Inteligence for Modelling Control and Automation and International Conference on Intelligent Agents Web Technologies and International Commerce (CIMCA'06)","start":{"date-parts":[[2006,11,28]]},"location":"Sydney, Australia","end":{"date-parts":[[2006,12,1]]}},"container-title":["2006 International Conference on Computational Inteligence for Modelling Control and Automation and International Conference on Intelligent Agents Web Technologies and International Commerce (CIMCA'06)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4052642\/4052643\/04052673.pdf?arnumber=4052673","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,23]],"date-time":"2019-04-23T17:24:49Z","timestamp":1556040289000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4052673\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"references-count":11,"URL":"https:\/\/doi.org\/10.1109\/cimca.2006.56","relation":{},"subject":[],"published":{"date-parts":[[2006]]}}}