{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T06:36:49Z","timestamp":1725518209344},"publisher-location":"Berlin, Heidelberg","reference-count":5,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540859833"},{"type":"electronic","value":"9783540859840"}],"license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-85984-0_114","type":"book-chapter","created":{"date-parts":[[2008,9,7]],"date-time":"2008-09-07T17:00:48Z","timestamp":1220806848000},"page":"951-958","source":"Crossref","is-referenced-by-count":1,"title":["Study of Immune Control Computing in Immune Detection Algorithm for Information Security"],"prefix":"10.1007","author":[{"given":"Ya Jing","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Yang","family":"Xue","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"3","key":"114_CR1","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1038\/scientificamerican0993-80","volume":"269","author":"P. Marrack","year":"1993","unstructured":"Marrack, P., Kappler, J.W.: How the immune system recognizes the body. Scientific American\u00a0269(3), 81\u201389 (1993)","journal-title":"Scientific American"},{"key":"114_CR2","first-page":"271","volume-title":"Proceedings of the 1994 IEEE Symposium on Research in Security and Privacy","author":"S. Forrest","year":"1994","unstructured":"Forrest, S., Perelson, A.S., Allen, L.R., et al.: Self-nonself Discrimination in a Computer. In: Proceedings of the 1994 IEEE Symposium on Research in Security and Privacy, pp. 271\u2013281. IEEE Computer Society Press, Los Alamitos (1994)"},{"key":"114_CR3","unstructured":"D\u2019haeseleer, P., Forrest, S., Helman, P.: An Immunological Approach to Change Detection: Algorithms, Analysis, and Implications. In: Proceedings of the 1996 IEEE Symposium on Computer Security and Privacy, pp. 98\u2013109 (1996)"},{"key":"114_CR4","doi-asserted-by":"crossref","unstructured":"Chen, W.Q., Zhou, J.Z., et al.: Compensatory Controller Based on Artificial Immune System. In: International Conference on Mechatronics and Automation, pp. 1608\u20131613 (2006)","DOI":"10.1109\/ICMA.2006.257436"},{"key":"114_CR5","unstructured":"Zhang, Y.J., Yang, X., Wu, S.H.: A Gene Immune Detection Algorithm with a Strategy of DNA PRI. In: 2004 International Conference on Machine Learning and Cybernetics, pp. 476\u2013481 (2004)"}],"container-title":["Lecture Notes in Computer Science","Advanced Intelligent Computing Theories and Applications. With Aspects of Artificial Intelligence"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-85984-0_114","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,1,30]],"date-time":"2020-01-30T05:57:03Z","timestamp":1580363823000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-85984-0_114"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540859833","9783540859840"],"references-count":5,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-85984-0_114","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2008]]}}}