{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,22]],"date-time":"2025-01-22T05:26:06Z","timestamp":1737523566993,"version":"3.33.0"},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540007081"},{"type":"electronic","value":"9783540365327"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/3-540-36532-x_15","type":"book-chapter","created":{"date-parts":[[2007,10,25]],"date-time":"2007-10-25T19:34:36Z","timestamp":1193340876000},"page":"234-248","source":"Crossref","is-referenced-by-count":3,"title":["Design and Implementation of Security System Based on Immune System"],"prefix":"10.1007","author":[{"given":"Hiroyuki","family":"Nishiyama","sequence":"first","affiliation":[]},{"given":"Fumio","family":"Mizoguchi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2003,6,25]]},"reference":[{"key":"15_CR1","unstructured":"J. Balthrop, S. Forrest and M. Glickman, Revisiting LISYS: Parameters and Normal Behavior, Proceedings of the 2002 Congress on Evolutionary Computation (in press)."},{"key":"15_CR2","unstructured":"W. DuMouchel, Computer intrusion detection based on Bay es Factors for comparing command transition probabilities, National Institut e of Statistical Sciences Technical Report, 1999."},{"issue":"10","key":"15_CR3","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1145\/262793.262811","volume":"40","author":"S. Forrest","year":"1997","unstructured":"S. Forrest, S. A. Hofmeyr and A. Somayaji, Computer Immunology, Communications of the ACM, Vol. 40, No. 10, pp. 88\u201396, 1997.","journal-title":"Communications of the ACM"},{"key":"15_CR4","doi-asserted-by":"crossref","unstructured":"S. Forrest, A.S. Perelson, L. Allen and R. Cherukuri, Self-Nonself Discrimination in a Computer, In Proceedings of the 1994 IEEE Symposium on Research in Security and Privacy, 1994.","DOI":"10.1109\/RISP.1994.296580"},{"key":"15_CR5","unstructured":"Yumiko Hanaoka, Goichiro Hanaoka and Hideki Imai, Artificial Immune System: A New Model of Anomaly Detection and Its Methods of Implementation, Computer Security Symposium 2000, pp. 231\u2013236, 2000."},{"issue":"1","key":"15_CR6","first-page":"45","volume":"7","author":"S. A. Hofmeyr","year":"2000","unstructured":"S. A. Hofmeyr and S. Forrest, Architecture for an artificial immune system, Evolutionary Computation, 7(1), pp. 45\u201368, 2000.","journal-title":"Evolutionary Computation"},{"issue":"3","key":"15_CR7","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1145\/322510.322526","volume":"2","author":"T. Lane","year":"1999","unstructured":"T. Lane and C. E. Brodley, Temporal Sequence Learning and Data Reduction for Anomaly Detection, ACM Transactions on Information and System Security, 2(3), pp. 295\u2013331, 1999.","journal-title":"ACM Transactions on Information and System Security"},{"key":"15_CR8","doi-asserted-by":"crossref","unstructured":"Fumio Mizoguchi, Anomaly Detection Using Visualization and Machine Learning, Proc. of the Ninth IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (Workshop: Enterprise Security), pp. 165\u2013170, 2000.","DOI":"10.1109\/ENABL.2000.883722"},{"key":"15_CR9","unstructured":"Peter G. Neumann and Phillip A. Porras, Experience with EMERALD to DATE, Usenix Workshop on Intrusion Detecion, 1999."},{"key":"15_CR10","doi-asserted-by":"crossref","unstructured":"H. Nishiyama, H. Ohwada and F. Mizoguchi, A Multiaget Robot Language for Communication and Concurrency Control, International Conference on Multiagent Systems, pp. 206\u2013213, 1998.","DOI":"10.1109\/ICMAS.1998.699051"},{"key":"15_CR11","unstructured":"Tomio Tada, Semantics of immunology (in Japanease), Seidosha, 1993."},{"key":"15_CR12","unstructured":"A. Taguchi, et al, The Study and Implementation for Tracing Intruder by Mobile Agent, and Intrusion Detection using Marks, Proc. of the 1999 Synposium on Cryptography and Information Security, pp. 627\u2013632, 1999."}],"container-title":["Lecture Notes in Computer Science","Software Security \u2014 Theories and Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-36532-X_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,21]],"date-time":"2025-01-21T22:27:12Z","timestamp":1737498432000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-36532-X_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540007081","9783540365327"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/3-540-36532-x_15","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2003]]}}}