{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,31]],"date-time":"2025-03-31T01:10:20Z","timestamp":1743383420637,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642309755"},{"type":"electronic","value":"9783642309762"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-30976-2_35","type":"book-chapter","created":{"date-parts":[[2012,6,12]],"date-time":"2012-06-12T16:58:11Z","timestamp":1339520291000},"page":"291-299","source":"Crossref","is-referenced-by-count":2,"title":["A Danger Feature Based Negative Selection Algorithm"],"prefix":"10.1007","author":[{"given":"Pengtao","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Ying","family":"Tan","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"35_CR1","doi-asserted-by":"crossref","unstructured":"Forrest, S., Perelson, A.S., Allen, L., Rajesh, C.: Self-nonself discrimination in a computer. In: IEEE Computer Society Symposium on Research in Security and Privacy, Oakland, pp. 202\u2013212 (1994)","DOI":"10.1109\/RISP.1994.296580"},{"key":"35_CR2","unstructured":"Forrest, S., Hofmeyr, S.A., Somayaji, A., Longstaff, T.A.: A sense of self for Unix processes. In: IEEE Symposium on Security and Privacy, Oakland, pp. 120\u2013128 (1996)"},{"key":"35_CR3","doi-asserted-by":"crossref","unstructured":"Somayaji, A., Hofmeyer, S., Forrest, S.: Principle of a computer immune system. In: New Security Paradigms Workshop, Cumbria, pp. 75\u201382 (1998)","DOI":"10.1145\/283699.283742"},{"issue":"5566","key":"35_CR4","first-page":"301","volume":"296","author":"P. Matzinger","year":"2002","unstructured":"Matzinger, P.: The danger model: a renewed sense of self. Science\u2019s STKE\u00a0296(5566), 301\u2013305 (2002)","journal-title":"Science\u2019s STKE"},{"key":"35_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1007\/978-3-540-45192-1_15","volume-title":"Artificial Immune Systems","author":"U. Aickelin","year":"2003","unstructured":"Aickelin, U., Bentley, P., Cayzer, S., Kim, J., McLeod, J.: Danger Theory: The Link between AIS and IDS? In: Timmis, J., Bentley, P.J., Hart, E. (eds.) ICARIS 2003. LNCS, vol.\u00a02787, pp. 147\u2013155. Springer, Heidelberg (2003)"},{"key":"35_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"287","DOI":"10.1007\/978-3-540-24854-5_30","volume-title":"Genetic and Evolutionary Computation \u2013 GECCO 2004","author":"Z. Ji","year":"2004","unstructured":"Ji, Z., Dasgupta, D.: Real-Valued Negative Selection Algorithm with Variable-Sized Detectors. In: Deb, K., et al. (eds.) GECCO 2004, Part I. LNCS, vol.\u00a03102, pp. 287\u2013298. Springer, Heidelberg (2004)"},{"key":"35_CR7","doi-asserted-by":"crossref","unstructured":"Li, Z., Liang, Y.W., Wu, Z.J., Tan, C.Y.: Immunity based virus detection with process call arguments and user feedback. In: Bio-Inspired Models of Network, Information and Computing Systems, Budapest, pp. 57\u201364 (2007)","DOI":"10.4108\/ICST.BIONETICS2007.2447"},{"issue":"4","key":"35_CR8","first-page":"422","volume":"39","author":"T. Li","year":"2009","unstructured":"Li, T.: Dynamic detection for computer virus based on immune system. Sci. China Inf. Sci.\u00a039(4), 422\u2013430 (2009) (in Chinese)","journal-title":"Sci. China Inf. Sci."},{"key":"35_CR9","doi-asserted-by":"crossref","unstructured":"Wang, W., Zhang, P.T., Tan, Y., He, X.G.: A hierarchical artificial immune model for virus detection. In: International Conference on Computational Intelligence and Security, Beijing, pp. 1\u20135 (2009)","DOI":"10.1109\/CIS.2009.57"},{"key":"35_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"347","DOI":"10.1007\/978-3-642-13495-1_43","volume-title":"Advances in Swarm Intelligence","author":"W. Wang","year":"2010","unstructured":"Wang, W., Zhang, P., Tan, Y.: An Immune Concentration Based Virus Detection Approach Using Particle Swarm Optimization. In: Tan, Y., Shi, Y., Tan, K.C. (eds.) ICSI 2010. LNCS, vol.\u00a06145, pp. 347\u2013354. Springer, Heidelberg (2010)"},{"issue":"12","key":"35_CR11","doi-asserted-by":"publisher","first-page":"2461","DOI":"10.1007\/s11432-010-4123-5","volume":"53","author":"P.T. Zhang","year":"2010","unstructured":"Zhang, P.T., Wang, W., Tan, Y.: A malware detection model based on a negative selection algorithm with penalty factor. Sci. China Inf. Sci.\u00a053(12), 2461\u20132471 (2010)","journal-title":"Sci. China Inf. Sci."},{"key":"35_CR12","unstructured":"LibSVM, http:\/\/www.csie.ntu.edu.tw\/~cjlin\/libsvm\/"}],"container-title":["Lecture Notes in Computer Science","Advances in Swarm Intelligence"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-30976-2_35.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,31]],"date-time":"2025-03-31T00:29:15Z","timestamp":1743380955000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-30976-2_35"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642309755","9783642309762"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-30976-2_35","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}