{"id":"https://openalex.org/W2125429422","doi":"https://doi.org/10.1109/cicybs.2011.5949411","title":"Multi agent systems on military networks","display_name":"Multi agent systems on military networks","publication_year":2011,"publication_date":"2011-04-01","ids":{"openalex":"https://openalex.org/W2125429422","doi":"https://doi.org/10.1109/cicybs.2011.5949411","mag":"2125429422"},"language":"en","primary_location":{"id":"doi:10.1109/cicybs.2011.5949411","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cicybs.2011.5949411","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2011 IEEE Symposium on Computational Intelligence in Cyber Security (CICS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5028628770","display_name":"D. L. Hancock","orcid":"https://orcid.org/0000-0002-8478-7976"},"institutions":[{"id":"https://openalex.org/I55061410","display_name":"U.S. Air Force Institute of Technology","ror":"https://ror.org/03f9f1d95","country_code":"US","type":"education","lineage":["https://openalex.org/I1294991024","https://openalex.org/I1330347796","https://openalex.org/I1330347796","https://openalex.org/I2802362820","https://openalex.org/I4210089612","https://openalex.org/I4210102105","https://openalex.org/I4210102105","https://openalex.org/I55061410"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"David L. Hancock","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Graduate School of Engineering and Management, Air Force Institute of Technology, Dayton, OH, USA","Department of Electrical and Computer Engineering, Graduate School of Engineering and Management, Air Force Institute of Technology, Wright-Patterson AFB, Dayton, OH 45433, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Graduate School of Engineering and Management, Air Force Institute of Technology, Dayton, OH, USA","institution_ids":["https://openalex.org/I55061410"]},{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Graduate School of Engineering and Management, Air Force Institute of Technology, Wright-Patterson AFB, Dayton, OH 45433, USA","institution_ids":["https://openalex.org/I55061410"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5110638040","display_name":"Gary B. Lamont","orcid":null},"institutions":[{"id":"https://openalex.org/I55061410","display_name":"U.S. Air Force Institute of Technology","ror":"https://ror.org/03f9f1d95","country_code":"US","type":"education","lineage":["https://openalex.org/I1294991024","https://openalex.org/I1330347796","https://openalex.org/I1330347796","https://openalex.org/I2802362820","https://openalex.org/I4210089612","https://openalex.org/I4210102105","https://openalex.org/I4210102105","https://openalex.org/I55061410"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Gary B. Lamont","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Graduate School of Engineering and Management, Air Force Institute of Technology, Dayton, OH, USA","Department of Electrical and Computer Engineering, Graduate School of Engineering and Management, Air Force Institute of Technology, Wright-Patterson AFB, Dayton, OH 45433, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Graduate School of Engineering and Management, Air Force Institute of Technology, Dayton, OH, USA","institution_ids":["https://openalex.org/I55061410"]},{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Graduate School of Engineering and Management, Air Force Institute of Technology, Wright-Patterson AFB, Dayton, OH 45433, USA","institution_ids":["https://openalex.org/I55061410"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5028628770"],"corresponding_institution_ids":["https://openalex.org/I55061410"],"apc_list":null,"apc_paid":null,"fwci":0.7002,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.73718994,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"30","issue":null,"first_page":"100","last_page":"107"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10064","display_name":"Complex Network Analysis Techniques","score":0.994700014591217,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/sophistication","display_name":"Sophistication","score":0.8999758958816528},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7320510149002075},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7035271525382996},{"id":"https://openalex.org/keywords/attack-surface","display_name":"Attack surface","score":0.594545304775238},{"id":"https://openalex.org/keywords/reputation","display_name":"Reputation","score":0.5689966082572937},{"id":"https://openalex.org/keywords/cyber-physical-system","display_name":"Cyber-physical system","score":0.5054295063018799},{"id":"https://openalex.org/keywords/multi-agent-system","display_name":"Multi-agent system","score":0.4706800580024719},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3676307201385498},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.206376850605011}],"concepts":[{"id":"https://openalex.org/C168725872","wikidata":"https://www.wikidata.org/wiki/Q991663","display_name":"Sophistication","level":2,"score":0.8999758958816528},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7320510149002075},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7035271525382996},{"id":"https://openalex.org/C2776576444","wikidata":"https://www.wikidata.org/wiki/Q303569","display_name":"Attack surface","level":2,"score":0.594545304775238},{"id":"https://openalex.org/C48798503","wikidata":"https://www.wikidata.org/wiki/Q877546","display_name":"Reputation","level":2,"score":0.5689966082572937},{"id":"https://openalex.org/C179768478","wikidata":"https://www.wikidata.org/wiki/Q1120057","display_name":"Cyber-physical system","level":2,"score":0.5054295063018799},{"id":"https://openalex.org/C41550386","wikidata":"https://www.wikidata.org/wiki/Q529909","display_name":"Multi-agent system","level":2,"score":0.4706800580024719},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3676307201385498},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.206376850605011},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.0},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/cicybs.2011.5949411","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cicybs.2011.5949411","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2011 IEEE Symposium on Computational Intelligence in Cyber Security (CICS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":43,"referenced_works":["https://openalex.org/W50943336","https://openalex.org/W120010193","https://openalex.org/W173570005","https://openalex.org/W178245947","https://openalex.org/W238797735","https://openalex.org/W290811799","https://openalex.org/W311023421","https://openalex.org/W320536502","https://openalex.org/W1529060400","https://openalex.org/W1539151385","https://openalex.org/W1553373771","https://openalex.org/W1577648965","https://openalex.org/W1603652346","https://openalex.org/W1629051378","https://openalex.org/W1690522583","https://openalex.org/W1968076133","https://openalex.org/W2008879046","https://openalex.org/W2011283335","https://openalex.org/W2025226660","https://openalex.org/W2032254348","https://openalex.org/W2095478116","https://openalex.org/W2108673751","https://openalex.org/W2116562078","https://openalex.org/W2117747231","https://openalex.org/W2133659731","https://openalex.org/W2134387601","https://openalex.org/W2161591413","https://openalex.org/W2163784994","https://openalex.org/W2171331105","https://openalex.org/W4243490088","https://openalex.org/W4252292900","https://openalex.org/W4285719527","https://openalex.org/W6602114223","https://openalex.org/W6604939574","https://openalex.org/W6607232722","https://openalex.org/W6609175535","https://openalex.org/W6610525180","https://openalex.org/W6610752967","https://openalex.org/W6611163372","https://openalex.org/W6631690235","https://openalex.org/W6632051357","https://openalex.org/W6637449346","https://openalex.org/W6680164963"],"related_works":["https://openalex.org/W2317823609","https://openalex.org/W4241263575","https://openalex.org/W3130462184","https://openalex.org/W2902287117","https://openalex.org/W2958357193","https://openalex.org/W2908913802","https://openalex.org/W4288639227","https://openalex.org/W1861659358","https://openalex.org/W2768554658","https://openalex.org/W2907149398"],"abstract_inverted_index":{"Trends":[0],"in":[1,5],"computing":[2],"and":[3,12,31,45],"networking,":[4],"terms":[6],"of":[7,71],"physical":[8],"capability,":[9],"attack":[10,46],"surface,":[11],"attacker":[13],"sophistication,":[14],"call":[15],"for":[16,55,64,73],"automated,":[17],"fault-tolerant":[18],"response":[19],"systems.":[20],"Military":[21],"networks":[22],"present":[23],"such":[24,34],"environments":[25],"with":[26,58],"unique":[27],"authorities,":[28],"critical":[29],"systems,":[30],"threats.":[32],"Within":[33],"environments,":[35],"multi":[36,51],"agent":[37,52],"systems":[38,53],"may":[39],"make":[40],"special":[41],"contributions":[42],"regarding":[43],"recognisance":[44],"scenarios.":[47],"We":[48],"survey":[49],"three":[50],"designed":[54],"cyber":[56],"operations,":[57],"particular":[59],"emphasis":[60],"on":[61],"our":[62],"classifier":[63],"flow-based":[65],"attacks,":[66],"which":[67],"demonstrates":[68],"the":[69],"effectiveness":[70],"reputation":[72],"distributing":[74],"classifying":[75],"agents":[76],"effectively.":[77]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2017,"cited_by_count":2},{"year":2012,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
