{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:52:38Z","timestamp":1740099158289,"version":"3.37.3"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030000080"},{"type":"electronic","value":"9783030000097"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-00009-7_54","type":"book-chapter","created":{"date-parts":[[2018,9,20]],"date-time":"2018-09-20T17:20:42Z","timestamp":1537464042000},"page":"601-611","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["An Immunity-Based Security Threat Detection System for Cyberspace Digital Virtual Assets"],"prefix":"10.1007","author":[{"given":"Ping","family":"Lin","sequence":"first","affiliation":[]},{"given":"Tao","family":"Li","sequence":"additional","affiliation":[]},{"given":"Xiaojie","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Hui","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Jin","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Fangdong","family":"Zhu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,9,21]]},"reference":[{"unstructured":"Rouse, M.: Definition of virtual asset (2018). http:\/\/searchfinancialsecurity.techtarget.com\/definition\/virtual-asset","key":"54_CR1"},{"doi-asserted-by":"crossref","unstructured":"Goodman, J., Verbrugge, C.: A peer auditing scheme for cheat elimination in MMOGs. In: Proceedings of the 7th ACM SIGCOMM Workshop on Network and System Support for Games, pp. 9\u201314 (2008)","key":"54_CR2","DOI":"10.1145\/1517494.1517496"},{"issue":"5","key":"54_CR3","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/MS.2011.88","volume":"28","author":"A Denault","year":"2011","unstructured":"Denault, A., Kienzle, J.: Journey: a massively multiplayer online game middleware. IEEE Softw. 28(5), 38\u201344 (2011)","journal-title":"IEEE Softw."},{"issue":"1","key":"54_CR4","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2522968.2522977","volume":"46","author":"A Yahyavi","year":"2013","unstructured":"Yahyavi, A., Kemme, B.: Peer-to-peer architectures for massively multiplayer online games: a survey. ACM Comput. Surv. (CSUR) 46(1), 1\u201351 (2013)","journal-title":"ACM Comput. Surv. (CSUR)"},{"doi-asserted-by":"crossref","unstructured":"Yahyavi, A., Huguenin, K., Gascon-samson, J., Kienzle, J., Kemme, B.: Watchmen: scalable cheat-resistant support for distributed multi-player online games. In: IEEE International Conference on Distributed Computing Systems, pp. 134\u2013144 (2013)","key":"54_CR5","DOI":"10.1109\/ICDCS.2013.62"},{"unstructured":"Maguluri, N.S.N.: Multi-class classification of textual data: detection and mitigation of cheating in massively multiplayer online role playing games (2017)","key":"54_CR6"},{"doi-asserted-by":"crossref","unstructured":"Miller, A., Juels, A., Shi, E., Parno, B., Katz, J.: Permacoin: repurposing bitcoin work for data preservation. In: 2014 IEEE Symposium on Security and Privacy (SP), pp. 475\u2013490 (2014)","key":"54_CR7","DOI":"10.1109\/SP.2014.37"},{"doi-asserted-by":"crossref","unstructured":"Dagher, G.G., B\u00fcnz, B., Bonneau, J., Clark, J., Boneh, D.: Provisions: privacy-preserving proofs of solvency for bitcoin exchanges. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp. 720\u2013731 (2015)","key":"54_CR8","DOI":"10.1145\/2810103.2813674"},{"issue":"12","key":"54_CR9","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1109\/MSPEC.2016.7761864","volume":"53","author":"M Peck","year":"2016","unstructured":"Peck, M.: A blockchain currency that beat s bitcoin on privacy [news]. IEEE Spectr. 53(12), 11\u201313 (2016)","journal-title":"IEEE Spectr."},{"unstructured":"Lazarovich, A.: Invisible Ink: blockchain for data privacy. Ph.d. thesis, Massachusetts Institute of Technology (2015)","key":"54_CR10"},{"doi-asserted-by":"crossref","unstructured":"Zyskind, G., Nathan, O., et al.: Decentralizing privacy: Using blockchain to protect personal data. In: 2015 IEEE Security and Privacy Workshops (SPW), pp. 180\u2013184 (2015)","key":"54_CR11","DOI":"10.1109\/SPW.2015.27"},{"doi-asserted-by":"crossref","unstructured":"Kishigami, J., Fujimura, S., Watanabe, H., Nakadaira, A., Akutsu, A.: The blockchain-based digital content distribution system. In: 2015 IEEE Fifth International Conference on Big Data and Cloud Computing (BDCloud), pp. 187\u2013190 (2015)","key":"54_CR12","DOI":"10.1109\/BDCloud.2015.60"},{"unstructured":"Herbert, J., Litchfield, A.: A novel method for decentralised peer-to-peer software license validation using cryptocurrency blockchain technology. In: Proceedings of the 38th Australasian Computer Science Conference (ACSC 2015), vol. 27, p. 30 (2015)","key":"54_CR13"},{"issue":"8","key":"54_CR14","doi-asserted-by":"crossref","first-page":"1736","DOI":"10.1109\/TIFS.2016.2555281","volume":"11","author":"TD Denemark","year":"2016","unstructured":"Denemark, T.D., Boroumand, M., Fridrich, J.: Steganalysis features for content-adaptive JPEG steganography. IEEE Trans. Inf. Forensics Secur. 11(8), 1736\u20131746 (2016)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"unstructured":"Akinwande, V.: Security assessment of blockchain-as-a-service (BaaS) platforms (2017)","key":"54_CR15"},{"unstructured":"Matters, M.: Bitcoins, block chains, and mining pools (2014)","key":"54_CR16"},{"doi-asserted-by":"crossref","unstructured":"Massacci, F., Ngo, C.-N., Williams, J.M.: Decentralized transaction clearing beyond blockchains (2016)","key":"54_CR17","DOI":"10.2139\/ssrn.2794913"},{"issue":"7571","key":"54_CR18","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1038\/526021a","volume":"526","author":"A Extance","year":"2015","unstructured":"Extance, A.: The future of cryptocurrencies: bitcoin and beyond. Nat. News 526(7571), 21 (2015)","journal-title":"Nat. News"},{"issue":"10","key":"54_CR19","first-page":"1475","volume":"51","author":"T Li","year":"2008","unstructured":"Li, T.: Dynamic detection for computer virus based on immune system. Sci. China Ser. F: Inf. Sci. 51(10), 1475\u20131486 (2008)","journal-title":"Sci. China Ser. F: Inf. Sci."},{"issue":"2","key":"54_CR20","doi-asserted-by":"crossref","first-page":"179","DOI":"10.1162\/1063656054088503","volume":"13","author":"M Glickman","year":"2005","unstructured":"Glickman, M., Balthrop, J., Forrest, S.: A machine learning evaluation of an artificial immune system. Evolut. Comput. 13(2), 179\u2013212 (2005)","journal-title":"Evolut. Comput."},{"issue":"4","key":"54_CR21","doi-asserted-by":"crossref","first-page":"413","DOI":"10.1007\/s11047-006-9026-4","volume":"6","author":"J Kim","year":"2007","unstructured":"Kim, J., Bentley, P.J., Aickelin, U., Greensmith, J., Tedesco, G., Twycross, J.: Immune system approaches to intrusion detection-a review. Nat. Comput. 6(4), 413\u2013466 (2007)","journal-title":"Nat. Comput."}],"container-title":["Lecture Notes in Computer Science","Cloud Computing and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-00009-7_54","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,24]],"date-time":"2019-10-24T09:46:57Z","timestamp":1571910417000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-00009-7_54"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030000080","9783030000097"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-00009-7_54","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"ICCCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Cloud Computing and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Haikou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 June 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 June 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"incodldos2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icccsconf.org\/icccs2018.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}