{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T20:36:10Z","timestamp":1761597370289,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":25,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642337567"},{"type":"electronic","value":"9783642337574"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-33757-4_10","type":"book-chapter","created":{"date-parts":[[2012,8,24]],"date-time":"2012-08-24T10:01:36Z","timestamp":1345802496000},"page":"125-138","source":"Crossref","is-referenced-by-count":6,"title":["Bait a Trap: Introducing Natural Killer Cells to Artificial Immune System for Spyware Detection"],"prefix":"10.1007","author":[{"given":"Jun","family":"Fu","sequence":"first","affiliation":[]},{"given":"Huan","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Yiwen","family":"Liang","sequence":"additional","affiliation":[]},{"given":"Chengyu","family":"Tan","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"3","key":"10_CR1","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1049\/et.2009.0304","volume":"4","author":"N. Gilman","year":"2009","unstructured":"Gilman, N.: Hacking Goes Pro. Engineering & Technology\u00a04(3), 26\u201329 (2009)","journal-title":"Engineering & Technology"},{"issue":"8","key":"10_CR2","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1145\/1076211.1076237","volume":"48","author":"R. Thompson","year":"2005","unstructured":"Thompson, R.: Why Spyware Poses Multiple Threats to Security. Communications of the ACM\u00a048(8), 41\u201343 (2005)","journal-title":"Communications of the ACM"},{"key":"10_CR3","first-page":"78","volume-title":"2006 IEEE Symposium on Security and Privacy","author":"K. Borders","year":"2006","unstructured":"Borders, K., Zhao, X., Prakash, A.: Siren: Catching Evasive Malware (Short Paper). In: 2006 IEEE Symposium on Security and Privacy, pp. 78\u201385. IEEE Computer Society, Los Alamitos (2006)"},{"key":"10_CR4","doi-asserted-by":"crossref","unstructured":"Chandrasekaran, M., Vidyaraman, S., Upadhyaya, S.: SpyCon: Emulating User Activities to Detect Evasive Spyware. In: IEEE Int\u2019l Conference on Performance, Computing, and Communications, pp. 502\u2013509 (2007)","DOI":"10.1109\/PCCC.2007.358933"},{"key":"10_CR5","volume-title":"Spyware and Adware","author":"J. Aycock","year":"2010","unstructured":"Aycock, J.: Spyware and Adware. Springer, New York (2010)"},{"key":"10_CR6","volume-title":"5th Symposium on Operating Systems Design and Implementation","author":"M. Shaw","year":"2002","unstructured":"Shaw, M., Gribble, S.D.: Reverse Firewalls in Denali. In: 5th Symposium on Operating Systems Design and Implementation. USENIX Association, Berkeley (2002)"},{"key":"10_CR7","first-page":"110","volume-title":"11th ACM Conference on Computer and Communications Security","author":"K. Borders","year":"2004","unstructured":"Borders, K., Prakash, A.: Web Tap: Detecting Covert Web Traffic. In: 11th ACM Conference on Computer and Communications Security, pp. 110\u2013120. ACM Press, New York (2004)"},{"key":"10_CR8","unstructured":"Wang, Y., Roussev, R., Verbowski, C., Johnson, A., Wu, M., Huang, Y., Kuo, S.: Gatekeeper: Monitoring Auto-Start Extensibility Points (ASEPs) for Spyware Management. In: LISA: 18th Systems Administration Conference, pp. 33\u201346 (2004)"},{"key":"10_CR9","first-page":"368","volume-title":"International Conference on Dependable Systems and Networks","author":"Y.M. Wang","year":"2005","unstructured":"Wang, Y.M., Beck, D., Vo, B., Roussev, R., Verbowski, C.: Detecting stealth software with Strider GhostBuster. In: International Conference on Dependable Systems and Networks, pp. 368\u2013377. IEEE Press, Los Alamitos (2005)"},{"key":"10_CR10","first-page":"273","volume-title":"15th USENIX Security Symposium","author":"E. Kirda","year":"2006","unstructured":"Kirda, E., Kruegel, C., Banks, G., Vigna, G., Kemmerer, R.A.: Behavior-based Spyware Detection. In: 15th USENIX Security Symposium, pp. 273\u2013288. USENIX Association, Berkeley (2006)"},{"key":"10_CR11","volume-title":"2007 USENIX Annual Technical Conference","author":"M. Egele","year":"2007","unstructured":"Egele, M., Kruegel, C., Kirda, E., Yin, H., Song, D.: Dynamic Spyware Analysis. In: 2007 USENIX Annual Technical Conference. USENIX Association, Berkeley (2007)"},{"key":"10_CR12","first-page":"1","volume-title":"3rd International Conference on Information and Communication Technologies: From Theory to Applications","author":"N. Arastouie","year":"2008","unstructured":"Arastouie, N., Razzazi, M.R.: Hunter: An Anti Spyware for Windows Operating System. In: 3rd International Conference on Information and Communication Technologies: From Theory to Applications, pp. 1\u20135. IEEE Press, Los Alamitos (2008)"},{"key":"10_CR13","doi-asserted-by":"crossref","unstructured":"Al-Hammadi, Y., Aickelin, U.: Detecting Bots Based on Keylogging Activities. In: 3rd International Conference on Availability, Reliability and Security, pp. 896\u2013902 (2008)","DOI":"10.2139\/ssrn.2830397"},{"key":"10_CR14","series-title":"IFIP","first-page":"669","volume-title":"SEC 2008","author":"J. Han","year":"2008","unstructured":"Han, J., Kwon, J., Lee, H.: HoneyID: Unveiling Hidden Spywares by Generating Bogus Events. In: SEC 2008. IFIP, vol.\u00a0278, pp. 669\u2013673. Springer, Boston (2008)"},{"key":"10_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1007\/978-3-642-15512-3_11","volume-title":"Recent Advances in Intrusion Detection","author":"S. Ortolani","year":"2010","unstructured":"Ortolani, S., Giuffrida, C., Crispo, B.: Bait Your Hook: A Novel Detection Technique for Keyloggers. In: Jha, S., Sommer, R., Kreibich, C. (eds.) RAID 2010. LNCS, vol.\u00a06307, pp. 198\u2013217. Springer, Heidelberg (2010)"},{"issue":"4","key":"10_CR16","doi-asserted-by":"publisher","first-page":"413","DOI":"10.1007\/s11047-006-9026-4","volume":"6","author":"J. Kim","year":"2007","unstructured":"Kim, J., Bentley, P.J., Aickelin, U., Greensmith, J., Tedesco, G., Twycross, J.: Immune System Approaches to Intrusion Detection - A Review. Natural Computing\u00a06(4), 413\u2013466 (2007)","journal-title":"Natural Computing"},{"key":"10_CR17","doi-asserted-by":"crossref","unstructured":"Al-Hammadi, Y., Aickelin, U., Greensmith, J.: DCA for Bot Detection. In: 2008 IEEE Congress on Evolutionary Computation, pp. 1807\u20131816. IEEE Press (2008)","DOI":"10.1109\/CEC.2008.4631034"},{"key":"10_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"220","DOI":"10.1007\/978-3-642-03246-2_22","volume-title":"Artificial Immune Systems","author":"S. Manzoor","year":"2009","unstructured":"Manzoor, S., Shafiq, M., Tabish, S., Farooq, M.: A Sense of \u2018Danger\u2019 for Windows Processes. In: Andrews, P.S., Timmis, J., Owens, N.D.L., et al. (eds.) ICARIS 2009. LNCS, vol.\u00a05666, pp. 220\u2013233. Springer, Heidelberg (2009)"},{"key":"10_CR19","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1109\/CMC.2010.269","volume-title":"2010 International Conference on Communications and Mobile Computing","author":"J. Fu","year":"2010","unstructured":"Fu, J., Liang, Y.W., Tan, C.Y., Xiong, X.F.: Detecting Software Keyloggers with Dendritic Cell Algorithm. In: 2010 International Conference on Communications and Mobile Computing, pp. 111\u2013115. IEEE Computer Society, Los Alamitos (2010)"},{"issue":"3","key":"10_CR20","doi-asserted-by":"publisher","first-page":"461","DOI":"10.1182\/blood-2007-09-077438","volume":"112","author":"M.A. Caligiuri","year":"2008","unstructured":"Caligiuri, M.A.: Human Natural Killer Cells. Blood\u00a0112(3), 461\u2013469 (2008)","journal-title":"Blood"},{"key":"10_CR21","doi-asserted-by":"publisher","first-page":"991","DOI":"10.1146\/annurev.iy.12.040194.005015","volume":"12","author":"P. Matzinger","year":"1994","unstructured":"Matzinger, P.: Tolerance, Danger, and the Extended Family. Annu. Rev. Immunol.\u00a012, 991\u20131045 (1994)","journal-title":"Annu. Rev. Immunol."},{"key":"10_CR22","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1146\/annurev.immunol.23.021704.115526","volume":"23","author":"L.L. Lanier","year":"2005","unstructured":"Lanier, L.L.: NK Cell Recognition. Annu. Rev. Immunol.\u00a023, 225\u2013274 (2005)","journal-title":"Annu. Rev. Immunol."},{"issue":"1","key":"10_CR23","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1016\/S0092-8674(01)80014-3","volume":"91","author":"C. Soderberg-Naucler","year":"1997","unstructured":"Soderberg-Naucler, C., Fish, K.N., Nelson, J.A.: Reactivation of Latent Human Cytomegalovirus by Allogeneic Stimulation of Blood Cells from Healthy Donors. Cell\u00a091(1), 119\u2013126 (1997)","journal-title":"Cell"},{"key":"10_CR24","doi-asserted-by":"crossref","first-page":"590","DOI":"10.4049\/jimmunol.179.1.590","volume":"179","author":"H. Guan","year":"2007","unstructured":"Guan, H., Moretto, M., Bzik, D.J., Gigley, J., Khan, I.A.: NK Cells Enhance Dendritic Cell Response against Parasite Antigens via NKG2D Pathway. The Journal of Immunology\u00a0179, 590\u2013596 (2007)","journal-title":"The Journal of Immunology"},{"issue":"3","key":"10_CR25","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1084\/jem.20010934","volume":"195","author":"D. Piccioli","year":"2002","unstructured":"Piccioli, D., Sbrana, S., Melandri, E., Valiante, N.M.: Contact-dependent Stimulation and Inhibition of Dendritic Cells by Natural Killer Cells. The Journal of Experimental Medicine\u00a0195(3), 335\u2013341 (2002)","journal-title":"The Journal of Experimental Medicine"}],"container-title":["Lecture Notes in Computer Science","Artificial Immune Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-33757-4_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,17]],"date-time":"2023-02-17T17:13:59Z","timestamp":1676654039000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-642-33757-4_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642337567","9783642337574"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-33757-4_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}