{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,11]],"date-time":"2025-01-11T11:40:33Z","timestamp":1736595633323,"version":"3.32.0"},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540473312"},{"type":"electronic","value":"9783540473329"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11903697_14","type":"book-chapter","created":{"date-parts":[[2006,10,11]],"date-time":"2006-10-11T15:48:07Z","timestamp":1160581687000},"page":"104-111","source":"Crossref","is-referenced-by-count":6,"title":["Immune Multi-agent Active Defense Model for Network Intrusion"],"prefix":"10.1007","author":[{"given":"SunJun","family":"Liu","sequence":"first","affiliation":[]},{"given":"Tao","family":"Li","sequence":"additional","affiliation":[]},{"given":"DianGang","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Kui","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Xun","family":"Gong","sequence":"additional","affiliation":[]},{"given":"XiaoQing","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Chun","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Gang","family":"Liang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"14_CR1","doi-asserted-by":"crossref","unstructured":"Bai, Y., Kobayashi, H.: Intrusion Detection Systems: technology and development. IEEE Advanced Information Networking and Applications, pp. 710\u2013715 (2003)","DOI":"10.1109\/AINA.2003.1192972"},{"key":"14_CR2","doi-asserted-by":"publisher","first-page":"2650","DOI":"10.1360\/982005-62","volume":"50","author":"T. Li","year":"2005","unstructured":"Li, T.: An immune based dynamic intrusion detection model. Chinese Science Bulletin\u00a050, 2650\u20132657 (2005)","journal-title":"Chinese Science Bulletin"},{"key":"14_CR3","unstructured":"Kim, J., Bentley, P.: The Artificial Immune Model for Network Intrusion Detection. In: 7th European Congress on Intelligent Techniques and Soft Computing (EUFIT 1999), Aachen, Germany (1999)"},{"key":"14_CR4","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1360\/04yf0140","volume":"48","author":"T. Li","year":"2005","unstructured":"Li, T.: An immunity based network security risk estimation. Science in China Ser. F Information Sciences\u00a048, 557\u2013578 (2005)","journal-title":"Science in China Ser. F Information Sciences"},{"key":"14_CR5","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1109\/MP.2005.1462463","volume":"24","author":"I.M. Hegazy","year":"2005","unstructured":"Hegazy, I.M., Faheem, H.M., Al-Arif, T., Ahmed, T.: Evaluating how well agent-based IDS perform. Potentials, Digital Object Identifier, IEEE\u00a024, 27\u201330 (2005)","journal-title":"Potentials, Digital Object Identifier, IEEE"},{"key":"14_CR6","volume-title":"Intelligent agent and their application [M]","author":"Z.Z. Shi","year":"2000","unstructured":"Shi, Z.Z.: Intelligent agent and their application [M]. Science Press, Beijing (2000)"},{"key":"14_CR7","unstructured":"Jerne, N.K.: Towards a Network Theory of the Immune System. Annnual Immunology\u00a0125c (1974)"},{"key":"14_CR8","volume-title":"Computer Immunology","author":"T. Li","year":"2004","unstructured":"Li, T.: Computer Immunology. Publishing House of Electronics Industry, Beijing (2004)"},{"key":"14_CR9","doi-asserted-by":"crossref","unstructured":"Forrest, S., Perelson, A.S.: Self-Nonself Discrimination in a Computer. In: Proceedings of IEEE Symposium on Research in Security and Privacy, Oakland (1994)","DOI":"10.1109\/RISP.1994.296580"},{"key":"14_CR10","doi-asserted-by":"crossref","unstructured":"Dasgupta, D.: An Artificial Immune System as a Multi-Agent Decision Support System. In: Proc. of the IEEE International Conference on SMC, San Diego (1998)","DOI":"10.1109\/ICSMC.1998.726682"},{"key":"14_CR11","doi-asserted-by":"crossref","unstructured":"Farmer, J.D., Packard, N.H., Perelson, A.S.: The Immune System, Adaption, and Machine Learning, vol.\u00a022d. Physica (1986)","DOI":"10.1016\/0167-2789(86)90240-X"},{"key":"14_CR12","unstructured":"Ayara, T.: Negative Selection: How to Generate Detectors. In: Proc. of 1st International Conference on Artificial Immune Systems, University of Kent Canterbury (2002)"}],"container-title":["Lecture Notes in Computer Science","Simulated Evolution and Learning"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11903697_14.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,11]],"date-time":"2025-01-11T11:24:14Z","timestamp":1736594654000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11903697_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540473312","9783540473329"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/11903697_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}