{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T21:56:04Z","timestamp":1725573364463},"publisher-location":"Berlin, Heidelberg","reference-count":5,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540228431"},{"type":"electronic","value":"9783540286486"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-28648-6_108","type":"book-chapter","created":{"date-parts":[[2010,12,20]],"date-time":"2010-12-20T14:38:54Z","timestamp":1292855934000},"page":"675-680","source":"Crossref","is-referenced-by-count":6,"title":["An NN-Based Malicious Executables Detection Algorithm Based on Immune Principles"],"prefix":"10.1007","author":[{"given":"Zhenhe","family":"Guo","sequence":"first","affiliation":[]},{"given":"Zhengkai","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Ying","family":"Tan","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"unstructured":"MEF Group: Malicious Email Filter Group. Published as Online Publication, http:\/\/www.cs.columbia.edu\/ids\/mef","key":"108_CR1"},{"doi-asserted-by":"crossref","unstructured":"Jeffrey, O.K., William, C.A.: Automatic Extraction of Computer Virus Signatures. In: Proceedings of the 4th Virus Bulletin International Conference, Abingdon England, pp. 178\u2013184 (1994)","key":"108_CR2","DOI":"10.1016\/0142-0496(94)90045-0"},{"unstructured":"Matthew, G.S., Eleazar, E., Erez, Z.: Data Mining Methods for Detection of New Malicious Executables. In: Proceedings of 2001 IEEE Symposium on Security and Privacy, Oakland USA, pp. 38\u201349 (2001)","key":"108_CR3"},{"unstructured":"Steve, R.W., Morton, S., Edward, J.P.: Anatomy of a Commercial-Grade Immune System. IBM Research White Paper (1999)","key":"108_CR4"},{"key":"108_CR5","first-page":"985","volume-title":"Proceedings of International Joint Conference on Artificial Intelligence","author":"O.K. Jeffrey","year":"1995","unstructured":"Jeffrey, O.K., William, C.A.: Biologically Inspired Defenses Against Computer Viruses. In: Proceedings of International Joint Conference on Artificial Intelligence, pp. 985\u2013996. Morgan Kaufmann, San Francisco (1995)"}],"container-title":["Lecture Notes in Computer Science","Advances in Neural Networks - ISNN 2004"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-28648-6_108.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,18]],"date-time":"2020-11-18T23:27:33Z","timestamp":1605742053000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-28648-6_108"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540228431","9783540286486"],"references-count":5,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-28648-6_108","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}