{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T21:04:25Z","timestamp":1725483865194},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540437857"},{"type":"electronic","value":"9783540480501"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/3-540-48050-1_55","type":"book-chapter","created":{"date-parts":[[2007,5,20]],"date-time":"2007-05-20T08:09:49Z","timestamp":1179648589000},"page":"514-525","source":"Crossref","is-referenced-by-count":0,"title":["A Biological Approach to the Development of Computer Autoimmune Systems"],"prefix":"10.1007","author":[{"given":"Kevin","family":"Deeb","sequence":"first","affiliation":[]},{"given":"Steven","family":"Lewis","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,6,21]]},"reference":[{"key":"55_CR1","first-page":"727","volume-title":"Artificial Life II. Studies in the Sciences of Complexity","author":"E. H. Spafford","year":"1991","unstructured":"Spafford, E. H. 1991. Computer viruses: A form of artificial life? In D. Farmer, C. Langton, S. Rasmussen, and C. Taylor, eds., Artificial Life II. Studies in the Sciences of Complexity, 727\u2013747. Redwood City: Addison-Wesley."},{"key":"55_CR2","doi-asserted-by":"crossref","unstructured":"Kephart, Jeffrey O., Steve R. White, and David M. Chess. Computers and epidemiology. IEEE Spectrum, May 1993, 20\u201326.","DOI":"10.1109\/6.275061"},{"key":"55_CR3","volume-title":"Department of Computer Science","author":"A. Somayaji","year":"7131","unstructured":"Anil Somayaji, Steven Hofmeyr, Stephanie Forrest. Principles of a Computer Immune System. Department of Computer Science. University of New Mexico. Albuquerque, NM 87131"},{"key":"55_CR4","unstructured":"P. D\u2019haeseleeer, S. Forrest, P. Helman. An Immunological Approach To Change Detection: Algorithms, Analysis and Implications. Preceedings Of The 1996 IEEE Symposium On Computer Security and Privacy. IEEE, 1996."},{"key":"55_CR5","volume-title":"Health and Disease","author":"C.A. Janeway","year":"1996","unstructured":"C.A. Janeway, P. Travers. Immunology: The Immune System In Health and Disease. Current Biology Ltd., London, 2nd edition, 1996.","edition":"2nd edition"},{"key":"55_CR6","first-page":"130","volume-title":"Proceedings of the Fourth International Workshop on Synthesis and Simulatoin of Living Systems","author":"J. O. Kephart","year":"1994","unstructured":"Jeffrey O. Kephart. A Biologically Inspired Immune System, Artificial Life IV, Proceedings of the Fourth International Workshop on Synthesis and Simulatoin of Living Systems. MIT Press, Cambridge, Massachusetts, 1994, pp. 130\u2013139."},{"key":"55_CR7","unstructured":"Stephanie Forrest. Computer Immunology. University of Mexico, 1996"},{"key":"55_CR8","doi-asserted-by":"publisher","first-page":"1691 1695","DOI":"10.1073\/pnas.90.5.1691","volume":"90","author":"J.K. Percus","year":"1993","unstructured":"J.K. Percus, O. Percus, A.S. Perelson. Predicting The Size Of The Antibody Combining Region From Consideration Of Efficient self\/nonself Discrimination. Proceedings Of The National Academy Of Science, 90:1691 1695, 1993.","journal-title":"Proceedings Of The National Academy Of Science"},{"key":"55_CR9","unstructured":"http:\/\/vmware1.m0.net\/m\/s.asp?HB4162878203X1075673X73339X"},{"key":"55_CR10","unstructured":"Steve R. White. Open Problems in Computer Virus Research. Virus Bulletin Conference, Oct 22, 1998. Munich, Germany."},{"key":"55_CR11","unstructured":"Martin Overton. Viruses and Lotus Notes: Have Virus Writers Finally Met Their Match. Proceedings of the Ninth International Virus Bulletin Conference, 1999, pp 149\u2013174."},{"issue":"4","key":"55_CR12","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1016\/0167-4048(87)90067-8","volume":"6","author":"M. Pozzo","year":"1987","unstructured":"Maria Pozzo and Terence Gray. An Approach to Containing Computer Viruses. Computers and Security, v6n4, 1987, pp. 321\u2013331.","journal-title":"Computers and Security"},{"key":"55_CR13","unstructured":"David Aubrey-Jones. Combining Encryption with an Anti-Virus Strategy. Proceedings of the Eighth International Virus Bulletin Conference, October 1999, pp 205\u2013234."},{"key":"55_CR14","unstructured":"Wenke Lee, Salvatore J. Stolfo. Adaptive Intrusion Detection: a Data Mining Approach. Computer Science Department, Columbia University, 500 West 120th Street, New York, NY 10027."},{"key":"55_CR15","doi-asserted-by":"crossref","unstructured":"Guy Helmer, Johnny S. K. Wong, Vasant Honavar, and Les Miller. Intelligent Agents for Intrusion Detection. Proceedings, IEEE Information Technology Conference, Syracuse, NY, September, 1998, pp. 121\u2013124.","DOI":"10.1109\/IT.1998.713396"},{"key":"55_CR16","unstructured":"Guy Helmer, Johnny Wong, Mark Slagell, Vasant Honavar, Les Miller, and Robyn Lutz. Software Fault Tree and Colored Petri Net Based Specification, Design and Implementation of Agent-Based Intrusion Detection Systems. Submitted to ACM Transactions on Information and System Security (TISSEC)."},{"key":"55_CR17","doi-asserted-by":"crossref","unstructured":"Wayne Jansen, Peter Mell, Tom Karygiannis, Donald Marks. Mobile Agents in Intrusion Detection and Response. Proceedings of the 12th Annual Canadian Information Technology Security Symposium, Ottawa, Canada, June 2000.","DOI":"10.6028\/NIST.IR.6416"},{"key":"55_CR18","unstructured":"Wenke Lee, Salvatore J. Stolfo. Data Mining Approaches for Intrusion Detection. Proceedings of the 7th USENIX Security Symposium, USENIX, 1998."},{"key":"55_CR19","volume-title":"Dynamic Detection And Classification Of Computer Viruses Using General Behavior Patterns","author":"B. Charlier Le","year":"1995","unstructured":"Baudouin Le Charlier, Abdelaziz Mounji, Morton Swimmer. Dynamic Detection And Classification Of Computer Viruses Using General Behavior Patterns. University Of Hamburg, Fachbereic Informatik Virus Test Center. Germany, July 2, 1995."},{"issue":"4","key":"55_CR20","first-page":"5","volume":"11","author":"G. Tesauro","year":"1996","unstructured":"Gerald Tesauro, Jeffrey O. Kephart, Gregory B. Sorkin. Neural Networks for Computer Virus Recognition. IEEE Expert, vol. 11, no. 4, pp. 5\u20136, Aug. 1996.","journal-title":"Neural Networks for Computer Virus Recognition"}],"container-title":["Lecture Notes in Computer Science","Foundations of Intelligent Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-48050-1_55","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,28]],"date-time":"2019-04-28T05:59:07Z","timestamp":1556431147000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-48050-1_55"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9783540437857","9783540480501"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/3-540-48050-1_55","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2002]]}}}