{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T17:45:55Z","timestamp":1725471955663},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540473312"},{"type":"electronic","value":"9783540473329"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11903697_13","type":"book-chapter","created":{"date-parts":[[2006,10,11]],"date-time":"2006-10-11T11:48:07Z","timestamp":1160567287000},"page":"96-103","source":"Crossref","is-referenced-by-count":2,"title":["Immune-Based Dynamic Intrusion Response Model"],"prefix":"10.1007","author":[{"given":"SunJun","family":"Liu","sequence":"first","affiliation":[]},{"given":"Tao","family":"Li","sequence":"additional","affiliation":[]},{"given":"Kui","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Jin","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Xun","family":"Gong","sequence":"additional","affiliation":[]},{"given":"JianHua","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"13_CR1","unstructured":"Fisch, E.A.: Intrusion Damage Control and Assessment: A Taxonomy and Implementation of Automated Responses to Intrusive Behavior. Ph.D. Dissertation, Texas A&M University, College Station TX (1996)"},{"key":"13_CR2","first-page":"129","volume-title":"Proceedings of the 2000 IEEE Workshop on Information Assurance and Security","author":"C.A. Carver","year":"2000","unstructured":"Carver, C.A., Pooch, U.W.: An Intrusion Response Taxonomy and its Role in Automatic Intrusion Response. In: Proceedings of the 2000 IEEE Workshop on Information Assurance and Security, pp. 129\u2013135. West Point, New York (2000)"},{"key":"13_CR3","doi-asserted-by":"crossref","unstructured":"Toth, T.: Evaluating the Impact of Automated Intrusion Response Mechanisms. In: 18th Annual Computer Security Applications Conference (ACSAC 2002) (2002)","DOI":"10.1109\/CSAC.2002.1176302"},{"key":"13_CR4","doi-asserted-by":"crossref","unstructured":"Forrest, S., Perelson, A., Cherukuri, R.: Self-Nonself Discrimination in a Computer. In: Proceedings of IEEE Symposium on Research in Security and Privacy, Oakland (1994)","DOI":"10.1109\/RISP.1994.296580"},{"key":"13_CR5","unstructured":"Kim, J., Bentley, P.J.: Immune Memory in the Dynamic Clonal Selection Algorithm. In: 1st International Conference on Artificial Immune Systems (ICARIS-2002), September 2002, University of Kent at Canterbury, UK (2002)"},{"key":"13_CR6","unstructured":"Lee, W., Fan, W., Miller, M.: Toward Cost-sensitive Modeling for Intrusion Detection and Response [C]. In: 1st ACM Workshop on Intrusion Detection Systems (2000)"},{"issue":"2","key":"13_CR7","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1016\/j.jtbi.2003.12.011","volume":"228","author":"D.L. Chao","year":"2004","unstructured":"Chao, D.L., Davenport, M.P., Forrest, S., Perelson, A.: A Stochastic Model of Cytotoxic Tcell Responses. Journal of Theoretical Biology\u00a0228(2), 227\u2013240 (2004)","journal-title":"Journal of Theoretical Biology"},{"key":"13_CR8","doi-asserted-by":"crossref","unstructured":"Varela, F.J., Stewart, J.: Dynamic of a Class of Immune Network. Global Stability of Idiotype Interactions. J. Theoretical Biology\u00a0(144), 93\u2013101 (1990)","DOI":"10.1016\/S0022-5193(05)80301-7"},{"key":"13_CR9","doi-asserted-by":"publisher","first-page":"2650","DOI":"10.1360\/982005-62","volume":"50","author":"T. Li","year":"2005","unstructured":"Li, T.: An immune based dynamic intrusion detection model. Chinese Science Bulletin\u00a050, 2650\u20132657 (2005)","journal-title":"Chinese Science Bulletin"},{"key":"13_CR10","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1360\/04yf0140","volume":"48","author":"T. Li","year":"2005","unstructured":"Li, T.: An immunity based network security risk estimation. Science in China Ser. F. Information Sciences.\u00a048, 557\u2013578 (2005)","journal-title":"Science in China Ser. F. Information Sciences."}],"container-title":["Lecture Notes in Computer Science","Simulated Evolution and Learning"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11903697_13.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T03:37:38Z","timestamp":1619494658000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11903697_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540473312","9783540473329"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/11903697_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}