{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T06:17:30Z","timestamp":1725517050751},"publisher-location":"Boston, MA","reference-count":20,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9780387096544"},{"type":"electronic","value":"9780387096551"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-0-387-09655-1_12","type":"book-chapter","created":{"date-parts":[[2008,8,19]],"date-time":"2008-08-19T13:40:02Z","timestamp":1219153202000},"page":"125-135","source":"Crossref","is-referenced-by-count":2,"title":["Intrusion Detection via Artificial Immune System: a Performance-based Approach"],"prefix":"10.1007","author":[{"given":"Andrea","family":"Visconti","sequence":"first","affiliation":[]},{"given":"Nicol\u00f3","family":"Fusi","sequence":"additional","affiliation":[]},{"given":"Hooman","family":"Tahayori","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"12_CR1_Ref","unstructured":". D\u2019haeseleer, P., Forrest, S., Helman, P.: An immunological approach to change detection: algorithms, analysis and implication. In: Proceedings of the 1996 IEEE Symposium on Computer Security and Privacy, (1996)"},{"key":"12_CR2_Ref","doi-asserted-by":"crossref","unstructured":". Forrest, S., Hofmeyr, S., Somayaji, A., Longstaff T.: A sense of self for UNIX processes. In: Proceedings of the 1996 IEEE Symposium on Research in Security and Privacy, (1996)","DOI":"10.1109\/SECPRI.1996.502675"},{"issue":"10","key":"12_CR3_Ref","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1145\/262793.262811","volume":"40","author":"S. Forrest","year":"1997","unstructured":"Forrest, S., Hofmeyr, S., Somayaji, A.: Computer immunology. In: Communication of ACM 40(10),88-96 (1997)","journal-title":"In: Communication of ACM"},{"key":"12_CR4_Ref","doi-asserted-by":"crossref","unstructured":". Dasgupta, D.: Advances in Artificial Immune Systems. In: IEEE Computational Intelligence Magazine, (November 2006)","DOI":"10.1109\/MCI.2006.329705"},{"issue":"3","key":"12_CR5_Ref","first-page":"151","volume":"6","author":"S. Hofmeyr","year":"1998","unstructured":"Hofmeyr, S., Somayaji, A., Forrest, S.: Intrusion Detection using Sequences of System Calls. In: Journal of Computer Security 6(3), 151-180 (1998)","journal-title":"In: Journal of Computer Security"},{"key":"12_CR6_Ref","unstructured":". Dasgupta, D.: Immune-based intrusion detection system: A general framework. In: Proceedings of the 22nd National Information Systems Security Conference, (1999)"},{"key":"12_CR7_Ref","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4757-3807-0","volume-title":"Immunocomputing: Principles and Applications","author":"A.O. Tarakanov","year":"2003","unstructured":"Tarakanov, A.O., Skormin, V.A., Sokolova, S.P.: Immunocomputing: Principles and Applications. Springer-Verlag, New York (2003)"},{"key":"12_CR8_Ref","unstructured":". Forrest, S., Glickman, M. R.: Revisiting LISYS: Parameters and Normal behavior. In: Proceedings of the 2002 Congress on Evolutionary Computation, (2002)"},{"key":"12_CR9_Ref","unstructured":". Warrender, C., Forrest, S., Pearlmutter, B.: Detecting intrusions using system calls: Alternative data models 1999. In: IEEE Symposium on security and Privacy, (1999)"},{"issue":"4","key":"12_CR10_Ref","doi-asserted-by":"publisher","first-page":"443","DOI":"10.1162\/106365600568257","volume":"8","author":"S. Hofmeyr","year":"2000","unstructured":"Hofmeyr, S., Forrest, S.: Architecture for an artificial immune system. In: Evolutionary Computation, 8(4), 443-473 (2000)","journal-title":"In: Evolutionary Computation"},{"key":"12_CR11_Ref","unstructured":". Hofmeyr, S.: An immunological model of distributed detection and its application to computer security. In: PhD thesis, University of New Mexico, (1999)"},{"key":"12_CR12_Ref","doi-asserted-by":"crossref","unstructured":". Balthrop, J., Forrest, S., Glickman, M.: Revisiting lisys: Parameters and normal behavior. In: Proceedings of the Congress on Evolutionary Computation, (2002)","DOI":"10.1109\/CEC.2002.1004387"},{"key":"12_CR13_Ref","unstructured":". Pagnoni, A., Visconti, A.: An Innate Immune System for the Protection of Computer Networks. In: Proceedings of the 4th International Symposium on Information and Communication Technologies, (2005)"},{"key":"12_CR14_Ref","doi-asserted-by":"crossref","unstructured":". Aickelin, U., Cayzer, S.: The Danger Theory and Its Application to Artificial Immune Systems. In: Proceedings of 1st International Conference on Artificial Immune Systems, (2002)","DOI":"10.2139\/ssrn.2832054"},{"key":"12_CR15_Ref","doi-asserted-by":"crossref","unstructured":". Aickelin, U., Bentley, P., Cayzer, S., Kim, J., McLeod, J.: Danger Theory: The Link between AIS and IDS? LCNS 2787, (2003).","DOI":"10.2139\/ssrn.2832042"},{"issue":"3","key":"12_CR16_Ref","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1006\/smim.2000.0236","volume":"12","author":"C. Anderson","year":"2000","unstructured":"Anderson, C., Matzinger, P.: Danger: the view from the bottom of the cliff. In: Seminars in Immunology, 12(3), 231-238 (2000)","journal-title":"In: Seminars in Immunology"},{"key":"12_CR17_Ref","unstructured":". Kim, J., Bentley, P.: The human Immune system and Network Intrusion Detection. In: Proceedings of 7th European Congress on Intelligent techniquesSoft Computing, (1999)"},{"key":"12_CR18_Ref","unstructured":". Gonzalez, F., Dasgupta, D.: An Immunogenetic Technique to Detect Anomalies in Network Traffic. In: Proceedings of the International Conference Genetic and Evolutionary Computation (GECCO), (2002)"},{"key":"12_CR19_Ref","unstructured":". Gentoo linux, available at http:\/\/www.gentoo.org\/"},{"key":"12_CR20_Ref","unstructured":". Apache JMeter, available at http:\/\/jakarta.apache.org\/jmeter\/"}],"container-title":["IFIP \u2013 The International Federation for Information Processing","Biologically-Inspired Collaborative Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-0-387-09655-1_12.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T21:04:14Z","timestamp":1605647054000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-0-387-09655-1_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9780387096544","9780387096551"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-0-387-09655-1_12","relation":{},"ISSN":["1571-5736"],"issn-type":[{"type":"print","value":"1571-5736"}],"subject":[]}}