{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,19]],"date-time":"2025-02-19T05:23:41Z","timestamp":1739942621986,"version":"3.37.3"},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540236351"},{"type":"electronic","value":"9783540376217"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-37621-7_18","type":"book-chapter","created":{"date-parts":[[2010,3,1]],"date-time":"2010-03-01T00:29:47Z","timestamp":1267403387000},"page":"330-344","source":"Crossref","is-referenced-by-count":0,"title":["The Design of a Secure Distributed Devices System Based on Immunity"],"prefix":"10.1007","author":[{"given":"Hiroyuki","family":"Nishiyama","sequence":"first","affiliation":[]},{"given":"Yukinobu","family":"Mine","sequence":"additional","affiliation":[]},{"given":"Fumio","family":"Mizoguchi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"18_CR1","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1007\/BF03038274","volume":"12","author":"T. Chikayama","year":"1993","unstructured":"Chikayama, T.: A KL1 Implementation for Unix Systems. New Generation Computing\u00a012, 123\u2013124 (1993)","journal-title":"New Generation Computing"},{"key":"18_CR2","doi-asserted-by":"crossref","unstructured":"Ferraiolo, D.F., Barkley, J.F., Richard Kuhn, D.: A Role Based Access Control Model and Reference Implementation within a Corporatre Internet. ACM Transactions on Information System Security\u00a01(2) (1999)","DOI":"10.1145\/300830.300834"},{"issue":"10","key":"18_CR3","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1145\/262793.262811","volume":"40","author":"S. Forrest","year":"1997","unstructured":"Forrest, S., Hofmeyr, S.A., Somayaji, A.: Computer Immunology. Communications of the ACM\u00a040(10), 88\u201396 (1997)","journal-title":"Communications of the ACM"},{"key":"18_CR4","doi-asserted-by":"crossref","unstructured":"Forrest, S., Perelson, A.S., Allen, L., Cherukuri, R.: Self-Nonself Discrimination in a Computer. In: Proceedings of the 1994 IEEE Symposium on Research in Security and Privacy (1994)","DOI":"10.1109\/RISP.1994.296580"},{"issue":"1","key":"18_CR5","first-page":"45","volume":"7","author":"S.A. Hofmeyr","year":"2000","unstructured":"Hofmeyr, S.A., Forrest, S.: Architecture for an artificial immune system. Evolutionary Computation\u00a07(1), 45\u201368 (2000)","journal-title":"Evolutionary Computation"},{"key":"18_CR6","unstructured":"Ishida, Y.: Active Diagnosis by Self-Organization: An Approach by The Immune Network Metaphor. In: Fifteenth International Joint Conference on Artificial Intelligence (IJCAI 1997), vol.\u00a02, pp. 1084\u20131089 (1997)"},{"key":"18_CR7","first-page":"187","volume-title":"Artificial Immune Systems and Their Applications","author":"Y. Watanabe","year":"1998","unstructured":"Watanabe, Y., Ishiguro, A., Uchikawa, Y.: Decentralized Behavior Arbitration Mechanism for Autonomous Mobile Robot Using Immune Network. In: Dasgupta, D. (ed.) Artificial Immune Systems and Their Applications, pp. 187\u2013209. Springer, Heidelberg (1998)"},{"key":"18_CR8","doi-asserted-by":"crossref","unstructured":"Mizoguchi, F.: Anomaly Detection Using Visualization and Machine Learning. In: Proc. of the Ninth IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (Workshop: Enterprise Security), pp. 165\u2013170 (2000)","DOI":"10.1109\/ENABL.2000.883722"},{"key":"18_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"234","DOI":"10.1007\/3-540-36532-X_15","volume-title":"Software Security \u2013 Theories and Systems","author":"H. Nishiyama","year":"2003","unstructured":"Nishiyama, H., Mizoguchi, F.: Design and Implementation of Security System Based on Immune System. In: Okada, M., Pierce, B.C., Scedrov, A., Tokuda, H., Yonezawa, A. (eds.) ISSS 2002. LNCS, vol.\u00a02609, pp. 234\u2013248. Springer, Heidelberg (2003)"},{"key":"18_CR10","doi-asserted-by":"crossref","unstructured":"Nishiyama, H., Ohwada, H., Mizoguchi, F.: A Multiaget Robot Language for Communication and Concurrency Control. International Conference on Multiagent Systems, 206\u2013213 (1998)","DOI":"10.1109\/ICMAS.1998.699051"},{"key":"18_CR11","first-page":"415","volume":"IAS-5","author":"T. Sato","year":"1998","unstructured":"Sato, T., Mori, T.: Robotic Room: Its concept and realization. Intelligent Autonomous Systems\u00a0IAS-5, 415\u2013422 (1998)","journal-title":"Intelligent Autonomous Systems"},{"key":"18_CR12","unstructured":"Tada, T.: Semantics of immunology, Seidosha (1993) (in Japanease)"}],"container-title":["Lecture Notes in Computer Science","Software Security - Theories and Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-37621-7_18.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,18]],"date-time":"2025-02-18T22:25:53Z","timestamp":1739917553000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-37621-7_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540236351","9783540376217"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-37621-7_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}