{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T18:14:17Z","timestamp":1725560057313},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540283256"},{"type":"electronic","value":"9783540318583"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11539117_113","type":"book-chapter","created":{"date-parts":[[2010,7,20]],"date-time":"2010-07-20T22:10:45Z","timestamp":1279663845000},"page":"804-813","source":"Crossref","is-referenced-by-count":0,"title":["A New Model of Immune-Based Network Surveillance and Dynamic Computer Forensics"],"prefix":"10.1007","author":[{"given":"Tao","family":"Li","sequence":"first","affiliation":[]},{"given":"Juling","family":"Ding","sequence":"additional","affiliation":[]},{"given":"Xiaojie","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Pin","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"113_CR1","unstructured":"Moan, J.: Computer Forensics in a Global Company. In: Proc. of 16th First Conf. Computer Security Incident Handling & Response, Budapest (2004)"},{"key":"113_CR2","doi-asserted-by":"crossref","unstructured":"Yoon, A.: Network Monitoring and Web Portal Site Project in AP Region. In: Proc. of 16th First Conf. Computer Security Incident Handling & Response, Budapest (2004)","DOI":"10.1016\/S1353-4858(04)00145-X"},{"key":"113_CR3","unstructured":"Bashaw, C.: Computer Forensics in Today\u2019s Investigative Process. In: Proc. of 15th First Conf. Computer Security Incident Handling & Response, Ottawa (2003)"},{"key":"113_CR4","unstructured":"Lidz, E.L.: Network Forensics. In: Proc. of 15th First Conf. Computer Security Incident Handling & Response, Ottawa (2003)"},{"key":"113_CR5","unstructured":"Reis, M.A., Geus, P.L.: Standardization of Computer Forensic Protocols and Procedures. In: Proc. of 14th First Conf. Computer Security Incident Handling & Response, Hawaii, vol.\u00a01, pp. 15\u201320 (2002)"},{"key":"113_CR6","volume-title":"An Introduction to Computer Network Security","author":"T. Li","year":"2004","unstructured":"Li, T.: An Introduction to Computer Network Security. Publishing House of Electronics Industry, Beijing (2004)"},{"key":"113_CR7","volume-title":"Computer Immunology","author":"T. Li","year":"2004","unstructured":"Li, T.: Computer Immunology. Publishing House of Electronics Industry, Beijing (2004)"},{"key":"113_CR8","unstructured":"Chao, D.L., Forrest, S.: Information Immune Systems. In: Conf. 1st International Conf. AIS, Canterbury, pp. 132\u2013140 (2002)"},{"issue":"1","key":"113_CR9","doi-asserted-by":"publisher","first-page":"443","DOI":"10.1162\/106365600568257","volume":"7","author":"S. Hofmeyr","year":"2000","unstructured":"Hofmeyr, S., Forrest, S.: Architecture for an Artificial Immune System. Evolutionary Computation\u00a07(1), 443\u2013473 (2000)","journal-title":"Evolutionary Computation"},{"issue":"3","key":"113_CR10","doi-asserted-by":"publisher","first-page":"252","DOI":"10.1109\/TEVC.2002.1011540","volume":"6","author":"P.K. Harmer","year":"2002","unstructured":"Harmer, P.K., Williams, P.D., Gunsch, G.H., Lamont, G.B.: An Artificial Immune System Architecture for Computer Security Applications. IEEE Trans. Evolutionary Computation\u00a06(3), 252\u2013280 (2002)","journal-title":"IEEE Trans. Evolutionary Computation"},{"key":"113_CR11","doi-asserted-by":"crossref","unstructured":"Forrest, S., Perelson, A.S.: Self-Nonself Discrimination in a Computer. In: Proc. of IEEE Symposium on Security and Privacy, Oakland, pp. 202\u2013213 (1994)","DOI":"10.1109\/RISP.1994.296580"},{"key":"113_CR12","doi-asserted-by":"crossref","unstructured":"Nasaroui, O., Gonzalez, F., Cardona, C., Dasgupta, D.: A Scalable Artificial Immune System Model for Dynamic Unsupervised Learning. In: Proc. of Genetic and Evolutionary Computation Conf., Chicago, pp. 219\u2013230 (2003)","DOI":"10.1007\/3-540-45105-6_27"},{"issue":"8","key":"113_CR13","doi-asserted-by":"crossref","first-page":"526","DOI":"10.1007\/s00500-002-0237-z","volume":"7","author":"L.N. Castro De","year":"2003","unstructured":"De Castro, L.N., Timmis, J.I.: Artificial Immune Systems as a Novel Soft Computing Paradigm. Soft Computing Journal\u00a07(8), 526\u2013544 (2003)","journal-title":"Soft Computing Journal"},{"key":"113_CR14","unstructured":"Kim, J., Bentley, P.J.: Towards an Artificial Immune System for Network Intrusion Detection: An investigation of Dynamic Clonal Selection. In: Proc. of the Congress on Evolutionary Computation, Honolulu, pp. 1015\u20131020 (2002)"},{"key":"113_CR15","unstructured":"Kim, J., Bentley, P.J.: Immune Memory in the Dynamic Clonal Selection Algorithm. In: Proc. of 1st International Conf. Artificial Immune System, Canterbury, pp. 57\u201365 (2002)"},{"key":"113_CR16","unstructured":"Kim, J., Bentley, P.J.: A Model of Gene Library Evolution in the Dynamic Clonal Selection Algorithm. In: Proc. 1st International Conf. AIS, Canterbury, pp. 175\u2013182 (2002)"},{"issue":"8","key":"113_CR17","first-page":"5","volume":"72","author":"J. Miller","year":"2001","unstructured":"Miller, J.: Immune Self-tolerance Mechanisms. Transplantation\u00a072(8), S5\u2013S9 (2001)","journal-title":"Transplantation"},{"key":"113_CR18","unstructured":"Ayara, M., Timmis, J., de Lemos, R., de Castro, L.N., Duncan, R.: Negative Selection: How to Generate Detectors. In: Proc. 1st International Conf. AIS, Canterbury, pp. 89\u201398 (2002)"},{"key":"113_CR19","unstructured":"Top 75 Security Tools (August 2004), Available http:\/\/www.insecure.org\/tools.html"},{"key":"113_CR20","unstructured":"The Coroner\u2019s Toolkit (August 2004), Available http:\/\/www.fish.com\/tct"}],"container-title":["Lecture Notes in Computer Science","Advances in Natural Computation"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11539117_113.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T20:15:16Z","timestamp":1605644116000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11539117_113"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540283256","9783540318583"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/11539117_113","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}