{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T18:14:24Z","timestamp":1725560064586},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540283256"},{"type":"electronic","value":"9783540318583"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11539117_118","type":"book-chapter","created":{"date-parts":[[2010,7,20]],"date-time":"2010-07-20T22:10:45Z","timestamp":1279663845000},"page":"839-848","source":"Crossref","is-referenced-by-count":1,"title":["Artificial Immune Strategies Improve the Security of Data Storage"],"prefix":"10.1007","author":[{"given":"Lei","family":"Wang","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Yinling","family":"Nie","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Weike","family":"Nie","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Licheng","family":"Jiao","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"issue":"1","key":"118_CR1","doi-asserted-by":"publisher","first-page":"468","DOI":"10.1038\/415468a","volume":"415","author":"E. Klarreich","year":"2002","unstructured":"Klarreich, E.: Inspired by Immunity. Nature\u00a0415(1), 468\u2013470 (2002)","journal-title":"Nature"},{"issue":"1","key":"118_CR2","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1109\/TSMCB.2003.817026","volume":"34","author":"F. Esponda","year":"2004","unstructured":"Esponda, F., Forrest, S., Helman, P.: A formal framework for positive and negative detection. IEEE Transactions on Systems, Man, and Cybernetics \u2013Part B: Cybernetics\u00a034(1), 357\u2013373 (2004)","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics \u2013Part B: Cybernetics"},{"issue":"3","key":"118_CR3","doi-asserted-by":"crossref","first-page":"239","DOI":"10.1109\/TEVC.2002.1011539","volume":"6","author":"L.N. Castro De","year":"2002","unstructured":"De Castro, L.N., Von Zuben, F.J.: Learning and Optimization Using the Clonal Selection Principle. IEEE Transactions on Evolutionary Computation, Special Issue on Artificial Immune Systems\u00a06(3), 239\u2013251 (2002)","journal-title":"IEEE Transactions on Evolutionary Computation, Special Issue on Artificial Immune Systems"},{"issue":"3","key":"118_CR4","first-page":"102","volume":"6","author":"D. Dasgupta","year":"2002","unstructured":"Dasgupta, D., Gonzalez, F.: An Immunity-Based Technique to Characterize Intrusions in Computer Networks. IEEE Transactions on Evolutionary Computation\u00a06(3), 102\u2013119 (2002)","journal-title":"IEEE Transactions on Evolutionary Computation"},{"key":"118_CR5","unstructured":"Wassung, K.W.: Challenging the theory of artificial immunity, \n                    \n                      http:\/\/www.atlaschiro.com\/artificial-immunity.htm"},{"issue":"1","key":"118_CR6","doi-asserted-by":"crossref","first-page":"13","DOI":"10.5751\/ES-00242-050113","volume":"5","author":"M.A. Janssen","year":"2001","unstructured":"Janssen, M.A.: An immune system perspective on ecosystem management. Conservation Ecology\u00a05(1), 13\u201315 (2001)","journal-title":"Conservation Ecology"},{"key":"118_CR7","unstructured":"New York Hall of Science website, \n                    \n                      http:\/\/www.nyhallsci.org\/whataboutaids\/whatis\/immune\/frame.html"},{"key":"118_CR8","unstructured":"ENSTOR\u00ae website: Optimized storage systems, \n                    \n                      http:\/\/www.enstor.com.au\/sol_store_data\/cons_disk.html"},{"key":"118_CR9","volume-title":"Digital Communications","author":"P.G. John","year":"1995","unstructured":"John, P.G.: Digital Communications. McGraw-Hill, New York (1995)"}],"container-title":["Lecture Notes in Computer Science","Advances in Natural Computation"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11539117_118.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T20:15:19Z","timestamp":1605644119000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11539117_118"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540283256","9783540318583"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/11539117_118","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}