{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T12:05:12Z","timestamp":1725537912887},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642040191"},{"type":"electronic","value":"9783642040207"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-04020-7_53","type":"book-chapter","created":{"date-parts":[[2009,9,14]],"date-time":"2009-09-14T18:43:19Z","timestamp":1252953799000},"page":"500-509","source":"Crossref","is-referenced-by-count":3,"title":["A New Intrusion Detection Method Based on Antibody Concentration"],"prefix":"10.1007","author":[{"given":"Jie","family":"Zeng","sequence":"first","affiliation":[]},{"given":"Tao","family":"Li","sequence":"additional","affiliation":[]},{"given":"Guiyang","family":"Li","sequence":"additional","affiliation":[]},{"given":"Haibo","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"53_CR1","first-page":"1848","volume":"93","author":"R.A. Kemmerer","year":"2005","unstructured":"Kemmerer, R.A., Vigna, G.: HI-DRA: Intrusion Detection for Internet Security. IEEE Transactions on Signal Processing\u00a093, 1848\u20131857 (2005)","journal-title":"IEEE Transactions on Signal Processing"},{"key":"53_CR2","doi-asserted-by":"publisher","first-page":"647","DOI":"10.1109\/TPAMI.2007.70717","volume":"30","author":"O.C. Hamsici","year":"2008","unstructured":"Hamsici, O.C., Martinez, A.M.: Bayes Optimality in Linear Discriminant Analysis. IEEE Transactions on Pattern Analysis and Machine Intelligence\u00a030, 647\u2013657 (2008)","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"53_CR3","doi-asserted-by":"publisher","first-page":"577","DOI":"10.1109\/TSMCB.2007.914695","volume":"38","author":"W.H. Hu","year":"2008","unstructured":"Hu, W.H., Hu, W., Maybank, S.: Adaboost-Based Algorithm for Network Intrusion Detection. IEEE Transactions on Systems, Man and Cybernetics.\u00a038, 577\u2013583 (2008)","journal-title":"IEEE Transactions on Systems, Man and Cybernetics."},{"key":"53_CR4","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1109\/MNET.2009.4804323","volume":"23","author":"J.K. Hu","year":"2009","unstructured":"Hu, J.K., Yu, X.H., Qiu, D.: A Simple and Efficient Hidden Markov Model Scheme for Host-Based Anomaly Intrusion Detection. IEEE Network\u00a023, 42\u201347 (2009)","journal-title":"IEEE Network"},{"key":"53_CR5","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1145\/262793.262811","volume":"40","author":"S. Forrest","year":"1997","unstructured":"Forrest, S., Hofmeyr, S.A.: Computer Immunology. Communications of the ACM\u00a040, 88\u201396 (1997)","journal-title":"Communications of the ACM"},{"key":"53_CR6","doi-asserted-by":"crossref","first-page":"202","DOI":"10.1109\/RISP.1994.296580","volume-title":"1994 IEEE International Symposium on Security and Privacy","author":"S. Forrest","year":"1994","unstructured":"Forrest, S., Perelson, A.S.: Self-nonself Discrimination in a Computer. In: 1994 IEEE International Symposium on Security and Privacy, pp. 202\u2013212. IEEE Press, Oakland (1994)"},{"key":"53_CR7","first-page":"1015","volume-title":"2002 IEEE Congress on Evolutionary Computation","author":"J. Kim","year":"2002","unstructured":"Kim, J., Bentley, P.: Toward an Artificial Immune System for Network Intrusion Detection: An Investigation of Dynamic Clonal Selection. In: 2002 IEEE Congress on Evolutionary Computation, pp. 1015\u20131020. IEEE Press, Honolulu (2002)"},{"key":"53_CR8","doi-asserted-by":"crossref","first-page":"2650","DOI":"10.1007\/BF03183665","volume":"50","author":"T. Li","year":"2005","unstructured":"Li, T.: An Immune Based Dynamic Intrusion Detection Model. Chinese Science Bulletin\u00a050, 2650\u20132657 (2005)","journal-title":"Chinese Science Bulletin"},{"key":"53_CR9","doi-asserted-by":"publisher","first-page":"1377","DOI":"10.1126\/science.1164266","volume":"322","author":"C.G. Mullighan","year":"2008","unstructured":"Mullighan, C.G., Philips, L.A., Su, X.P.: Genomic Analysis of the Clonal Origins of Relapsed Acute Lymphoblastic Leukemia. Science\u00a0322, 1377\u20131380 (2008)","journal-title":"Science"},{"key":"53_CR10","doi-asserted-by":"crossref","DOI":"10.5962\/bhl.title.8281","volume-title":"The Clonal Selection Theory of Acquired Immunity","author":"F.M. Burnet","year":"1959","unstructured":"Burnet, F.M.: The Clonal Selection Theory of Acquired Immunity. Cambridge University Press, New York (1959)"},{"key":"53_CR11","doi-asserted-by":"publisher","first-page":"1834","DOI":"10.1126\/science.1162484","volume":"321","author":"B.R. Han","year":"2008","unstructured":"Han, B.R., Herrin, B.R., Cooper, M.D.: Antigen Recognition by Variable Lymphocyte Receptors. Science\u00a0321, 1834\u20131837 (2008)","journal-title":"Science"},{"key":"53_CR12","doi-asserted-by":"publisher","first-page":"667","DOI":"10.1038\/nature06890","volume":"453","author":"J. Wrammert","year":"2008","unstructured":"Wrammert, J., Smith, K., Miller, J.: Rapid Cloning of High Affinity Human Monoclonal Antibodies against Influenza Virus. Nature\u00a0453, 667\u2013672 (2008)","journal-title":"Nature"},{"key":"53_CR13","doi-asserted-by":"publisher","first-page":"517","DOI":"10.1016\/j.compeleceng.2008.12.005","volume":"35","author":"M.A. Aydin","year":"2009","unstructured":"Aydin, M.A., Zaim, A.H., Ceylan, K.G.: A Hybird Intrusion Detection System Design for Computer Network Security. Computers and Electrical Engineering\u00a035, 517\u2013526 (2009)","journal-title":"Computers and Electrical Engineering"},{"key":"53_CR14","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1109\/FBIE.2008.9","volume-title":"2008 International Seminar on Future Biomedical Information Engineering","author":"J. Zeng","year":"2008","unstructured":"Zeng, J., Zeng, J.Q.: A Novel Immunity-Based Anomaly Detection Method. In: 2008 International Seminar on Future Biomedical Information Engineering, pp. 195\u2013198. IEEE Press, Wuhan (2008)"}],"container-title":["Lecture Notes in Computer Science","Emerging Intelligent Computing Technology and Applications. With Aspects of Artificial Intelligence"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-04020-7_53.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,26]],"date-time":"2023-05-26T19:11:15Z","timestamp":1685128275000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-04020-7_53"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642040191","9783642040207"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-04020-7_53","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}