{"id":"https://openalex.org/W1490045228","doi":"https://doi.org/10.1007/978-3-540-75476-3_48","title":"Performance Evaluation of a Mobile Agent Based Framework for Security Event Management in IP Networks","display_name":"Performance Evaluation of a Mobile Agent Based Framework for Security Event Management in IP Networks","publication_year":2007,"publication_date":"2007-09-17","ids":{"openalex":"https://openalex.org/W1490045228","doi":"https://doi.org/10.1007/978-3-540-75476-3_48","mag":"1490045228"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-540-75476-3_48","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-540-75476-3_48","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5036206226","display_name":"Ching-hang Fong","orcid":null},"institutions":[{"id":"https://openalex.org/I138801177","display_name":"University of Ulster","ror":"https://ror.org/01yp9g959","country_code":"GB","type":"education","lineage":["https://openalex.org/I138801177"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Ching-hang Fong","raw_affiliation_strings":["School of Computing and Information Engineering, Faculty of Engineering, University of Ulster, Coleraine, Co. Londonderry, BT52 1SA, United Kingdom","School of Computing and Information Engineering, Faculty of Engineering, University of Ulster, Coleraine, United Kingdom"],"affiliations":[{"raw_affiliation_string":"School of Computing and Information Engineering, Faculty of Engineering, University of Ulster, Coleraine, Co. Londonderry, BT52 1SA, United Kingdom","institution_ids":["https://openalex.org/I138801177"]},{"raw_affiliation_string":"School of Computing and Information Engineering, Faculty of Engineering, University of Ulster, Coleraine, United Kingdom","institution_ids":["https://openalex.org/I138801177"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5024314394","display_name":"Gerard Parr","orcid":"https://orcid.org/0000-0002-9365-9132"},"institutions":[{"id":"https://openalex.org/I138801177","display_name":"University of Ulster","ror":"https://ror.org/01yp9g959","country_code":"GB","type":"education","lineage":["https://openalex.org/I138801177"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Gerard Parr","raw_affiliation_strings":["School of Computing and Information Engineering, Faculty of Engineering, University of Ulster, Coleraine, Co. Londonderry, BT52 1SA, United Kingdom","School of Computing and Information Engineering, Faculty of Engineering, University of Ulster, Coleraine, United Kingdom"],"affiliations":[{"raw_affiliation_string":"School of Computing and Information Engineering, Faculty of Engineering, University of Ulster, Coleraine, Co. Londonderry, BT52 1SA, United Kingdom","institution_ids":["https://openalex.org/I138801177"]},{"raw_affiliation_string":"School of Computing and Information Engineering, Faculty of Engineering, University of Ulster, Coleraine, United Kingdom","institution_ids":["https://openalex.org/I138801177"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5064073991","display_name":"Philip Morrow","orcid":"https://orcid.org/0000-0002-2373-4758"},"institutions":[{"id":"https://openalex.org/I138801177","display_name":"University of Ulster","ror":"https://ror.org/01yp9g959","country_code":"GB","type":"education","lineage":["https://openalex.org/I138801177"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Philip Morrow","raw_affiliation_strings":["School of Computing and Information Engineering, Faculty of Engineering, University of Ulster, Coleraine, Co. Londonderry, BT52 1SA, United Kingdom","School of Computing and Information Engineering, Faculty of Engineering, University of Ulster, Coleraine, United Kingdom"],"affiliations":[{"raw_affiliation_string":"School of Computing and Information Engineering, Faculty of Engineering, University of Ulster, Coleraine, Co. Londonderry, BT52 1SA, United Kingdom","institution_ids":["https://openalex.org/I138801177"]},{"raw_affiliation_string":"School of Computing and Information Engineering, Faculty of Engineering, University of Ulster, Coleraine, United Kingdom","institution_ids":["https://openalex.org/I138801177"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5036206226"],"corresponding_institution_ids":["https://openalex.org/I138801177"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":0.4167,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.59691913,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"476","last_page":"486"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12203","display_name":"Mobile Agent-Based Network Management","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12203","display_name":"Mobile Agent-Based Network Management","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10742","display_name":"Peer-to-Peer Network Technologies","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.710091233253479},{"id":"https://openalex.org/keywords/network-management","display_name":"Network management","score":0.6045028567314148},{"id":"https://openalex.org/keywords/simple-network-management-protocol","display_name":"Simple Network Management Protocol","score":0.5674586892127991},{"id":"https://openalex.org/keywords/network-monitoring","display_name":"Network monitoring","score":0.5461763143539429},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5196220278739929},{"id":"https://openalex.org/keywords/network-management-application","display_name":"Network management application","score":0.515863835811615},{"id":"https://openalex.org/keywords/security-management","display_name":"Security management","score":0.4951092302799225},{"id":"https://openalex.org/keywords/network-management-station","display_name":"Network management station","score":0.48783043026924133},{"id":"https://openalex.org/keywords/event","display_name":"Event (particle physics)","score":0.4794687032699585},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.42583584785461426},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.42323383688926697},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.40245819091796875},{"id":"https://openalex.org/keywords/network-architecture","display_name":"Network architecture","score":0.12036165595054626}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.710091233253479},{"id":"https://openalex.org/C129763632","wikidata":"https://www.wikidata.org/wiki/Q1454667","display_name":"Network management","level":2,"score":0.6045028567314148},{"id":"https://openalex.org/C69527307","wikidata":"https://www.wikidata.org/wiki/Q184230","display_name":"Simple Network Management Protocol","level":3,"score":0.5674586892127991},{"id":"https://openalex.org/C81877898","wikidata":"https://www.wikidata.org/wiki/Q1965787","display_name":"Network monitoring","level":2,"score":0.5461763143539429},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5196220278739929},{"id":"https://openalex.org/C89094514","wikidata":"https://www.wikidata.org/wiki/Q7001060","display_name":"Network management application","level":4,"score":0.515863835811615},{"id":"https://openalex.org/C83163435","wikidata":"https://www.wikidata.org/wiki/Q3954104","display_name":"Security management","level":2,"score":0.4951092302799225},{"id":"https://openalex.org/C16986412","wikidata":"https://www.wikidata.org/wiki/Q918419","display_name":"Network management station","level":3,"score":0.48783043026924133},{"id":"https://openalex.org/C2779662365","wikidata":"https://www.wikidata.org/wiki/Q5416694","display_name":"Event (particle physics)","level":2,"score":0.4794687032699585},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.42583584785461426},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.42323383688926697},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.40245819091796875},{"id":"https://openalex.org/C193415008","wikidata":"https://www.wikidata.org/wiki/Q639681","display_name":"Network architecture","level":2,"score":0.12036165595054626},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1007/978-3-540-75476-3_48","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-540-75476-3_48","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},{"id":"pmh:oai:ueaeprints.uea.ac.uk:60111","is_oa":false,"landing_page_url":"https://ueaeprints.uea.ac.uk/id/eprint/60111/","pdf_url":null,"source":{"id":"https://openalex.org/S4306400384","display_name":"UEA Digital Repository (University of East Anglia)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1118541","host_organization_name":"University of East Anglia","host_organization_lineage":["https://openalex.org/I1118541"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":9,"referenced_works":["https://openalex.org/W1525451939","https://openalex.org/W1592457864","https://openalex.org/W1943075714","https://openalex.org/W1974325236","https://openalex.org/W2027339090","https://openalex.org/W2087266659","https://openalex.org/W2097139985","https://openalex.org/W2112127864","https://openalex.org/W2249686251"],"related_works":["https://openalex.org/W2380400043","https://openalex.org/W1979528400","https://openalex.org/W2375035220","https://openalex.org/W3181805982","https://openalex.org/W2378302710","https://openalex.org/W2106557141","https://openalex.org/W2366933082","https://openalex.org/W1569390378","https://openalex.org/W2371829462","https://openalex.org/W1973478904"],"abstract_inverted_index":null,"counts_by_year":[],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
