{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T11:29:48Z","timestamp":1743074988331,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":26,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642173479"},{"type":"electronic","value":"9783642173486"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-17348-6_16","type":"book-chapter","created":{"date-parts":[[2011,9,12]],"date-time":"2011-09-12T11:53:32Z","timestamp":1315828412000},"page":"405-423","source":"Crossref","is-referenced-by-count":0,"title":["Security in Artificial Systems"],"prefix":"10.1007","author":[{"given":"Noria","family":"Foukia","sequence":"first","affiliation":[]},{"given":"Melanie","family":"Middlemiss","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"16_CR1","volume-title":"The Evolution of Cooperation","author":"R. Axelrod","year":"1984","unstructured":"Axelrod, R.: The Evolution of Cooperation. Basic Books, New York (1984)"},{"key":"16_CR2","volume-title":"Proceedings of the European Conference on Object-Oriented Programming (ECOOP 2000)","author":"W. Binder","year":"2000","unstructured":"Binder, W.: Design and implementation of the J-SEAL2 mobile agent kernel. In: Proceedings of the European Conference on Object-Oriented Programming (ECOOP 2000) (2000)"},{"key":"16_CR3","volume-title":"Biology","author":"N.A. Campbell","year":"2004","unstructured":"Campbell, N.A., Reece, J.B.: Biology, 7th edn. Benjamin-Cummings, San Francisco (2004)","edition":"7"},{"key":"16_CR4","unstructured":"Coolen, R., Luiijf, H.A.M.: Intrusion detection: generics and state of the art. Tech. Rep., Research and Technology Organisation, Neuilly sur Seine, France (2002)"},{"key":"16_CR5","doi-asserted-by":"crossref","DOI":"10.1093\/acref\/9780199234004.001.0001","volume-title":"A Dictionary of Computing","author":"J. Daintith","year":"2008","unstructured":"Daintith, J., Wright, E.: A Dictionary of Computing, 6th edn. Oxford University Press, London (2008)","edition":"6"},{"issue":"9","key":"16_CR6","doi-asserted-by":"publisher","first-page":"805","DOI":"10.1016\/S1389-1286(98)00017-6","volume":"31","author":"H. Debar","year":"1999","unstructured":"Debar, H., Dacier, M., Wespi, A.: Towards a taxonomy of intrusion detection systems. Comput. Netw. 31(9), 805\u2013822 (1999)","journal-title":"Comput. Netw."},{"issue":"2","key":"16_CR7","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1109\/TSE.1987.232894","volume":"13","author":"D.E. Denning","year":"1987","unstructured":"Denning, D.E.: An intrusion detection model. IEEE Trans. Softw. Eng. 13(2), 222\u2013232 (1987)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"16_CR8","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1119\/1.1987158","volume":"41","author":"P. Glansdorff","year":"1973","unstructured":"Glansdorff, P., Prigogine, I.: Thermodynamic theory of structure, stability and fluctuations. Am. J. Phys. 41, 147\u2013148 (1973)","journal-title":"Am. J. Phys."},{"key":"16_CR9","doi-asserted-by":"crossref","unstructured":"Graham, R.: Frequent asked questions, network intrusion detection systems (2000). http:\/\/www.biblioteca.co.cr\/pdf\/network-intrusion-detection.pdf. White paper","DOI":"10.1016\/S1353-4858(00)10012-1"},{"issue":"1","key":"16_CR10","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1007\/BF02223791","volume":"6","author":"P.P. Grass\u00e9","year":"1959","unstructured":"Grass\u00e9, P.P.: La reconstruction du nid et les coordinations interindividuelles chezbellicositermes natalensis etcubitermes sp la th\u00e9orie de la stigmergie: Essai d\u2019interpr\u00e9tation du comportement des termites constructeurs. Insectes Soc. 6(1), 41\u201380 (1959). doi:10.1007\/BF02223791","journal-title":"Insectes Soc."},{"key":"16_CR11","unstructured":"Heady, R., Luger, G., Maccabe, A., Servilla, M.: The architecture of a network level intrusion detection system. Techn. Rep. CS90-20, Department of Computer Science, University of New Mexico, USA (1990). http:\/\/www.osti.gov\/energycitations\/servlets\/purl\/425295-4IN2Pw\/webviewable\/425295.pdf"},{"key":"16_CR12","unstructured":"Hofmeyr, S.A.: An immunological model of distributed detection and its application to computer security. Ph.D. thesis, University of New Mexico, USA (1999)"},{"key":"16_CR13","volume-title":"Immunobiology: The Immune System in Health and Disease","author":"C. Janeway","year":"2004","unstructured":"Janeway, C., Travers, P., Walport, M., Shlomchik, M.: Immunobiology: The Immune System in Health and Disease, 6th edn. Garland, New York (2004)","edition":"6"},{"key":"16_CR14","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1145\/288090.288122","volume-title":"Proceedings of the 5th ACM Conference on Computer and Communications Security","author":"T. Lane","year":"1998","unstructured":"Lane, T., Brodley, C.E.: Temporal sequence learning and data reduction for anomaly detection. In: Proceedings of the 5th ACM Conference on Computer and Communications Security, pp.\u00a0150\u2013158 (1998)"},{"key":"16_CR15","doi-asserted-by":"crossref","DOI":"10.4324\/9780203488287","volume-title":"Immunology, Instant Notes","author":"P.M. Lydyard","year":"2004","unstructured":"Lydyard, P.M., Whelan, A., Fanger, M.W.: Immunology, Instant Notes, 2nd edn. Bios Scientific, London (2004)","edition":"2"},{"key":"16_CR16","volume-title":"Network Security: A Beginner\u2019s Guide","author":"E. Maiwald","year":"2001","unstructured":"Maiwald, E.: Network Security: A Beginner\u2019s Guide. McGraw-Hill, New York (2001)"},{"key":"16_CR17","doi-asserted-by":"publisher","first-page":"991","DOI":"10.1146\/annurev.iy.12.040194.005015","volume":"12","author":"P. Matzinger","year":"1994","unstructured":"Matzinger, P.: Tolerance, danger, and the extended family. Annu. Rev. Immunol. 12, 991\u20131045 (1994)","journal-title":"Annu. Rev. Immunol."},{"issue":"5566","key":"16_CR18","doi-asserted-by":"publisher","first-page":"301","DOI":"10.1126\/science.1071059","volume":"296","author":"P. Matzinger","year":"2002","unstructured":"Matzinger, P.: The danger model: a renewed sense of self. Science 296(5566), 301\u2013305 (2002)","journal-title":"Science"},{"key":"16_CR19","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-07324-7","volume-title":"Fundamentals of Computer Security","author":"J. Pieprzyk","year":"2003","unstructured":"Pieprzyk, J., Hardjono, T., Seberry, J.: Fundamentals of Computer Security. Springer, Berlin (2003)"},{"key":"16_CR20","volume-title":"Infection and Immunity","author":"J.H.L. Playfair","year":"2004","unstructured":"Playfair, J.H.L., Bancroft, G.J.: Infection and Immunity, 2nd edn. Oxford University Press, Oxford (2004)","edition":"2"},{"key":"16_CR21","volume-title":"Immunology at a Glance","author":"J.H.L. Playfair","year":"2005","unstructured":"Playfair, J.H.L., Chain, B.M.: Immunology at a Glance, 8th edn. Blackwell Publishing, Malden (2005)","edition":"8"},{"issue":"4","key":"16_CR22","first-page":"25","volume":"15","author":"M. Ranum","year":"1999","unstructured":"Ranum, M.: Intrusion detection: ideals, expectations and realities. J. Comput. Secur. 15(4), 25\u201345 (1999)","journal-title":"J. Comput. Secur."},{"key":"16_CR23","volume-title":"Advances in Neural Information Processing System","author":"J. Ryan","year":"1998","unstructured":"Ryan, J., Lin, M.J., Miikkulainen, R.: Intrusion detection with neural networks. In: Jordan, M., Kearns, M., Solla, S. (eds.) Advances in Neural Information Processing System, vol. 10. MIT Press, Cambridge (1998)"},{"key":"16_CR24","volume-title":"How the Immune System Works","author":"L. Sompayrac","year":"2003","unstructured":"Sompayrac, L.: How the Immune System Works, 2nd edn. Blackwell Science, Malden (2003)","edition":"2"},{"issue":"4","key":"16_CR25","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1145\/332159.332161","volume":"2","author":"A. Sundaram","year":"1996","unstructured":"Sundaram, A.: An introduction to intrusion detection. Crossroads 2(4), 3\u20137 (1996)","journal-title":"Crossroads"},{"key":"16_CR26","volume-title":"Proceedings of the IEEE International Conference on Neural Networks","author":"K.M.C. Tan","year":"1995","unstructured":"Tan, K.M.C.: The application of neural networks to Unix computer security. In: Proceedings of the IEEE International Conference on Neural Networks (1995)"}],"container-title":["Natural Computing Series","Self-organising Software"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-17348-6_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,11]],"date-time":"2023-02-11T07:36:20Z","timestamp":1676100980000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-642-17348-6_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642173479","9783642173486"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-17348-6_16","relation":{},"ISSN":["1619-7127"],"issn-type":[{"type":"print","value":"1619-7127"}],"subject":[],"published":{"date-parts":[[2011]]}}}