{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,28]],"date-time":"2025-05-28T18:23:34Z","timestamp":1748456614788},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540421030"},{"type":"electronic","value":"9783540451167"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2001]]},"DOI":"10.1007\/3-540-45116-1_15","type":"book-chapter","created":{"date-parts":[[2007,8,6]],"date-time":"2007-08-06T17:22:00Z","timestamp":1186420920000},"page":"127-142","source":"Crossref","is-referenced-by-count":7,"title":["BASIS: A Biological Approach to System Information Security"],"prefix":"10.1007","author":[{"given":"Victor A.","family":"Skormin","sequence":"first","affiliation":[]},{"given":"Jose G.","family":"Delgado-Frias","sequence":"additional","affiliation":[]},{"given":"Dennis L.","family":"McGee","sequence":"additional","affiliation":[]},{"given":"Joseph V.","family":"Giordano","sequence":"additional","affiliation":[]},{"given":"Leonard J.","family":"Popyack","sequence":"additional","affiliation":[]},{"given":"Vladimir I.","family":"Gorodetski","sequence":"additional","affiliation":[]},{"given":"Alexander O.","family":"Tarakanov","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,5,8]]},"reference":[{"issue":"10","key":"15_CR1","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1145\/262793.262811","volume":"40","author":"S. Forrest","year":"1997","unstructured":"Forrest, S., Hofmeyer, S.A., and Somayaji, A.: Computer Immunology. Communication of the ACM, Vol. 40,No. 10, (October 1997) 88\u201396","journal-title":"Communication of the ACM"},{"key":"15_CR2","doi-asserted-by":"crossref","unstructured":"Somayaji, A., Hofmeyr, S., and Forrest, S.: Principles of a Computer Immune System. 1997 New Security Paradigms Workshop, Langdale, Cumbria, UK (1997) 75\u201382","DOI":"10.1145\/283699.283742"},{"key":"15_CR3","unstructured":"Crosbie, M., Spafford, E.: Active Defending of a Computer System using Autonomous Agents. Technical Report No. 95-008. COAST Group, Purdue University, (1995) 1\u201315"},{"key":"15_CR4","doi-asserted-by":"crossref","unstructured":"Balasubramaniyan, J., Garcia-Fernandez, J., Isakoff, D., Spafford, E., and Zamboni D.: An Architecture for Intrusion Detection using Autonomous Agents. In Proceedings of the 14th Annual Computer Security Applications Conference, Phoenix, Arizona. (December 7\u201311, 1998)","DOI":"10.1109\/CSAC.1998.738563"},{"key":"15_CR5","volume-title":"Immunology","author":"J. Kuby","year":"1997","unstructured":"Kuby, J.: Immunology. 3rd Edition. W.H. Freeman and Co., New York (1997)","edition":"3rd Edition"},{"key":"15_CR6","volume-title":"The immune system in health and disease","author":"C.A. Janeway","year":"1999","unstructured":"Janeway, C.A., Travers, P., Walport, W., and Capra, J.D.: Immunobiology. The immune system in health and disease. Garland Publishing, New York (1999)"},{"key":"15_CR7","unstructured":"Stolfo, S.J., Prodromidis, A.L., Tselepis, S., Lee, W., Fan, D.W., and Chan, P.K.: Jam: Java agents for meta-learning over distributed databases. In Proceedings of the 3rd International Conference on Knowledge Discovery and Data Mining, Newport Beach, CA, (1997) 74\u201381"},{"key":"15_CR8","doi-asserted-by":"crossref","unstructured":"White, G., Fish, E., and Pooch, U.: Cooperating Security Managers: A Peer-Based Intrusion Detection System. IEEE Network (January\/February 1996) 20\u201323","DOI":"10.1109\/65.484228"},{"key":"15_CR9","doi-asserted-by":"crossref","unstructured":"Stillman, M., Marceau, C., and Stillman, M.: Intrusion Detection for Distributed Applications. Communications of the ACM, Vol. 42,No. 7, (July 99) 63\u201369","DOI":"10.1145\/306549.306577"},{"key":"15_CR10","unstructured":"Warrender, C., Forrest, S., and Pearlmutter, B.: Detecting Intrusions Using System Calls: Alternative Data Models. IEEE Symp. on Security and Privacy, (1999) 133\u2013145"}],"container-title":["Lecture Notes in Computer Science","Information Assurance in Computer Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45116-1_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T19:43:59Z","timestamp":1556739839000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45116-1_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001]]},"ISBN":["9783540421030","9783540451167"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/3-540-45116-1_15","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2001]]}}}