{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,21]],"date-time":"2025-03-21T04:04:35Z","timestamp":1742529875244,"version":"3.40.1"},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642247279"},{"type":"electronic","value":"9783642247286"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-24728-6_68","type":"book-chapter","created":{"date-parts":[[2012,2,10]],"date-time":"2012-02-10T02:52:40Z","timestamp":1328842360000},"page":"502-508","source":"Crossref","is-referenced-by-count":0,"title":["A Trojan Detector Generating Algorithm Based on Chaotic Theory"],"prefix":"10.1007","author":[{"given":"Jie","family":"Qin","sequence":"first","affiliation":[]},{"given":"Qun","family":"Si","sequence":"additional","affiliation":[]},{"given":"Huijuan","family":"Yan","sequence":"additional","affiliation":[]},{"given":"Fuliang","family":"Yan","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"68_CR1","doi-asserted-by":"crossref","unstructured":"Paul, K., Williams, D., et al.: An Artificial Immune System Architecture for Computer Security Applications. IEEE Transaction on Evolutionary Computation, 6\u20133 (2002)","DOI":"10.1109\/TEVC.2002.1011540"},{"key":"68_CR2","doi-asserted-by":"crossref","unstructured":"Forrest, S., Alan, S., Allen, L.: Self-Nonself Discrimination in a Computer. In: Proceedings of the 1994 IEEE Symposium on Security and Privacy, pp. 202\u2013212 (1994)","DOI":"10.1109\/RISP.1994.296580"},{"key":"68_CR3","unstructured":"Zhang, H.: The Research and Implementation of Unknown Trojan Detection System Based on Artificial Immune. Master thesis of Xian University of electronic science and technology (2009)"},{"key":"68_CR4","unstructured":"Zhang, J.: A Network Intrusion Detection System Model Based on Immune Principle. Lanzhou: The master\u2019s degree thesis of Lanzhou University of technology (2008)"},{"issue":"2","key":"68_CR5","first-page":"221","volume":"34","author":"L. Chen","year":"2005","unstructured":"Chen, L., Zhang, L.: The Research on The Application of Artificial Immune Mechanism on Trojan Detection System. University of electronic science and technology journal\u00a034(2), 221\u2013224 (2005)","journal-title":"University of electronic science and technology journal"},{"issue":"4","key":"68_CR6","first-page":"221","volume":"37","author":"X. Yan","year":"2009","unstructured":"Yan, X.: Immune Intrusion Detection Model Using Vaccination Strategies. Electronic journal\u00a037(4), 221\u2013224 (2009)","journal-title":"Electronic journal"},{"key":"68_CR7","unstructured":"Zhang, N., Li, Z., et al.: The Immune Generating Algorithm Based on Chaotic Theory. Computer application (May 2006)"},{"issue":"8","key":"68_CR8","first-page":"1245","volume":"15","author":"H. Wang","year":"2004","unstructured":"Wang, H., He, C.: The Public Water-marking Based on Robustness of Chaos Mapping. Journal of software\u00a015(8), 1245\u20131251 (2004)","journal-title":"Journal of software"},{"key":"68_CR9","doi-asserted-by":"publisher","first-page":"1070","DOI":"10.1016\/j.cam.2006.09.008","volume":"206","author":"M. Tavazoei","year":"2007","unstructured":"Tavazoei, M., Haeri, M.: An Optimization Algorithm Based on Chaotic Behavior and Fractal Nature. J. Compute. Applied Math.\u00a0206, 1070\u20131081 (2007)","journal-title":"J. Compute. Applied Math."},{"key":"68_CR10","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1016\/j.chaos.2005.08.126","volume":"30","author":"X.Q. Zuo","year":"2006","unstructured":"Zuo, X.Q., Fan, Y.S.: A Chaos Search Immune Algorithm with Its Application to Neuro-fuzzy Controller Design. Chaos, Solitons and Fractals\u00a030, 94\u2013109 (2006)","journal-title":"Chaos, Solitons and Fractals"},{"key":"68_CR11","first-page":"186","volume":"01","author":"H. Shu","year":"2004","unstructured":"Shu, H., You, Z.: Application of Decision Attribute Classification and Mining Algorithm Based on Information Entropy. Computer engineering and application\u00a001, 186\u2013189 (2004)","journal-title":"Computer engineering and application"},{"key":"68_CR12","doi-asserted-by":"crossref","unstructured":"Hrycej, T.: Identifying Chaotic Attractors with Neural Networks. In: Proceedings of IEEE International Conference on Neural Network, pp. 2664\u20132668 (1995)","DOI":"10.1109\/ICNN.1995.487831"},{"key":"68_CR13","volume-title":"Artificial Immune System. A Novel Computational Intelligence Approach","author":"L. Castro","year":"2002","unstructured":"Castro, L., Timmis, J.: Artificial Immune System. A Novel Computational Intelligence Approach. Springer, London (2002)"},{"key":"68_CR14","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/BF03184078","volume":"50","author":"T. Li","year":"2005","unstructured":"Li, T.: A Dynamic Intrusion Detection Model Based on Immune. Science bulletin\u00a050, 17 (2005)","journal-title":"Science bulletin"}],"container-title":["Lecture Notes in Computer Science","Advanced Intelligent Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-24728-6_68","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,20]],"date-time":"2025-03-20T06:20:50Z","timestamp":1742451650000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-24728-6_68"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642247279","9783642247286"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-24728-6_68","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}