{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,6]],"date-time":"2025-02-06T05:15:39Z","timestamp":1738818939879,"version":"3.37.0"},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540921363"},{"type":"electronic","value":"9783540921370"}],"license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-92137-0_48","type":"book-chapter","created":{"date-parts":[[2008,12,12]],"date-time":"2008-12-12T16:23:27Z","timestamp":1229099007000},"page":"436-445","source":"Crossref","is-referenced-by-count":2,"title":["An Immune Multi-agent System for Network Intrusion Detection"],"prefix":"10.1007","author":[{"given":"Dian Gang","family":"Wang","sequence":"first","affiliation":[]},{"given":"Tao","family":"Li","sequence":"additional","affiliation":[]},{"given":"Sun Jun","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Gang","family":"Liang","sequence":"additional","affiliation":[]},{"given":"Kui","family":"Zhao","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"48_CR1","doi-asserted-by":"crossref","unstructured":"Bai, Y., Kobayashi, H.: Intrusion Detection Systems: technology and development. IEEE Advanced Information Networking and Applications, 710\u2013715 (2003)","DOI":"10.1109\/AINA.2003.1192972"},{"key":"48_CR2","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1078\/1434-8411-54100224","volume":"58","author":"A. Pilz","year":"2004","unstructured":"Pilz, A., Swoboda, J.: Network management information models. International Journal of Electronics and Communications\u00a058, 165\u2013171 (2004)","journal-title":"International Journal of Electronics and Communications"},{"key":"48_CR3","doi-asserted-by":"crossref","unstructured":"Dong, Y., Quian, J., Shi, M.: A cooperative intrusion detection system based on autonomous agents. In: IEEE CCECE 2003, vol.\u00a02, pp. 861\u2013863 (2003)","DOI":"10.1109\/CCECE.2003.1226031"},{"key":"48_CR4","doi-asserted-by":"crossref","unstructured":"Heseleer, D., Forrest, S.: An immunological approach to change detection: algorithm, analysis and implication. In: Proc. of IEEE Symposium on Research in Security and Privacy, Oakland, pp. 110\u2013119 (1996)","DOI":"10.1109\/SECPRI.1996.502674"},{"key":"48_CR5","unstructured":"Kim, J., Bentley, P.: The Artificial Immune Model for Network Intrusion Detection. In: 7th European Congress on Intelligent Techniques and Soft Computing (1999)"},{"key":"48_CR6","unstructured":"Harmer, P.K., Lamont, G.B.: An Agent Based Architecture for a Computer Virus Immune System. In: Proc. of the Genetic and Evolutionary Computation Conference, Orlando, Florida, USA (1999)"},{"issue":"1","key":"48_CR7","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1109\/TSMCB.2003.817026","volume":"34","author":"F. Esponda","year":"2004","unstructured":"Esponda, F., Forrest, S., Helman, P.: A formal frame work for positive and negative detection schemes. IEEE Transactions On Systems Man and Cybernetics Part B-Cybernetics\u00a034(1), 357\u2013373 (2004)","journal-title":"IEEE Transactions On Systems Man and Cybernetics Part B-Cybernetics"},{"issue":"2","key":"48_CR8","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1109\/MP.2005.1462463","volume":"24","author":"I.M. Hegazy","year":"2005","unstructured":"Hegazy, I.M., Faheem, H.M.: Evaluating how well agent-based IDS perform. IEEE Potentials\u00a024(2), 27\u201330 (2005)","journal-title":"IEEE Potentials"},{"key":"48_CR9","unstructured":"Ballet, P., Rodin, V.: Immune Mechanisms to Regulate Multi-Agents Systems. In: GECCO 2000, Las Vegas, Nevada, USA (2000)"},{"key":"48_CR10","unstructured":"Jerne, N.K.: Towards a Network Theory of the Immune System. Annnual Immunology 125C, 373\u2013389 (1974)"},{"key":"48_CR11","volume-title":"Computer Immunology","author":"T. Li","year":"2004","unstructured":"Li, T.: Computer Immunology. Publication House of Electric Industry, Beijing (2004)"},{"key":"48_CR12","volume-title":"Intelligent agent and their application","author":"S. Zhongzhi","year":"2000","unstructured":"Zhongzhi, S.: Intelligent agent and their application. Science Press, Beijing (2000)"},{"key":"48_CR13","doi-asserted-by":"crossref","unstructured":"Hofmeyr, A., Forrest, S.: Architecture for an Artificial Immune System. Evolutionary Computation\u00a07(1) (2000)","DOI":"10.1162\/106365600568257"},{"key":"48_CR14","doi-asserted-by":"crossref","unstructured":"Perelson, A.S.: Immunology for physicists. Review of Modern Physics\u00a069(4) (1997)","DOI":"10.1103\/RevModPhys.69.1219"},{"key":"48_CR15","doi-asserted-by":"crossref","unstructured":"Dasgupta, D.: An Artificial Immune System as a Multi-Agent Decision Support System. In: Proc. of the IEEE International Conference on SMC, San Diego (1998)","DOI":"10.1109\/ICSMC.1998.726682"},{"key":"48_CR16","doi-asserted-by":"crossref","unstructured":"Li, T.: A New Model for Dynamic Intrusion Detection. LNCS, pp. 72\u201384 (2005)","DOI":"10.1007\/11599371_7"},{"key":"48_CR17","unstructured":"Esponda, F., Forrest, S., Helman, P.: Positive and Negative Detection. IEEE Transactions on Systems, Man and Cybernetics (2002)"}],"container-title":["Lecture Notes in Computer Science","Advances in Computation and Intelligence"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-92137-0_48","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,6]],"date-time":"2025-02-06T04:54:53Z","timestamp":1738817693000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-92137-0_48"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540921363","9783540921370"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-92137-0_48","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2008]]}}}