{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,8]],"date-time":"2025-04-08T04:28:56Z","timestamp":1744086536388,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":27,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642341342"},{"type":"electronic","value":"9783642341359"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-34135-9_46","type":"book-chapter","created":{"date-parts":[[2012,9,10]],"date-time":"2012-09-10T12:08:15Z","timestamp":1347278895000},"page":"474-484","source":"Crossref","is-referenced-by-count":13,"title":["Biologically Inspired Computer Security System: The Way Ahead"],"prefix":"10.1007","author":[{"given":"Praneet","family":"Saurabh","sequence":"first","affiliation":[]},{"given":"Bhupendra","family":"Verma","sequence":"additional","affiliation":[]},{"given":"Sanjeev","family":"Sharma","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"46_CR1","doi-asserted-by":"crossref","unstructured":"Marin, A.G.: Network Security Basics, Security and Privacy, pp. 68\u201372. IEEE (2005)","DOI":"10.1109\/MSP.2005.153"},{"key":"46_CR2","unstructured":"Bishop, M.: Computer Security Art and Science. Pearson Education (2003)"},{"key":"46_CR3","unstructured":"Zhang, X.: Intrusion Prevention System Design. In: Computer and Information Technology, pp. 386\u2013390 (2004)"},{"key":"46_CR4","unstructured":"Robert, R.: CSI Computer Crime & Security Survey 2010 (2011)"},{"issue":"1-2","key":"46_CR5","doi-asserted-by":"crossref","first-page":"11","DOI":"10.71330\/nucleus.45.01-2.994","volume":"45","author":"F.M. Zafar","year":"2008","unstructured":"Zafar, F.M., Naheed, F., Ahmad, Z., Anwar, M.M.: Network Security: A Survey of Modern Approaches. The Nucleus\u00a045(1-2), 11\u201331 (2008)","journal-title":"The Nucleus"},{"key":"46_CR6","unstructured":"Bishop, M.: An Overview of Computer Viruses in a Research Environment. In: 4th DPMA, IEEE, ACM Computer Virus and Security Conference, pp. 154\u2013163 (1997)"},{"key":"46_CR7","doi-asserted-by":"crossref","unstructured":"Guillen, E.: Weakness and Strength Analysis over Network-Based Intrusion Prevention & Prevention Systems. Communications, 1\u20135 (2009)","DOI":"10.1109\/LATINCOM.2009.5305047"},{"key":"46_CR8","doi-asserted-by":"crossref","unstructured":"Krause, M., Tipton, F.H.: Handbook of Information Security, Management. CRC Press LLC (2006) ISBN: 0849399475","DOI":"10.1201\/9781439833032"},{"key":"46_CR9","unstructured":"Carter, E.: Intrusion Prevention Fundamentals: an introduction to network attack mitigation with IPS. Cisco Press (2006)"},{"key":"46_CR10","unstructured":"Endorf, C., Schultz, E., Mellander, J.: Intrusion Detection & Prevention. McGraw-Hill (2004)"},{"issue":"2","key":"46_CR11","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1109\/TSE.1987.232894","volume":"SE-13","author":"E.D. Denning","year":"1987","unstructured":"Denning, E.D.: An Intrusion-Detection Model. IEEE Transactions on Software Engineering\u00a0SE-13(2), 222\u2013232 (1987)","journal-title":"IEEE Transactions on Software Engineering"},{"key":"46_CR12","doi-asserted-by":"crossref","unstructured":"Mukerjee, B., Heberlein, T.L., Levitt, N.K.: Network Intrusion Detection. IEEE Network, 26\u201341 (1994)","DOI":"10.1109\/65.283931"},{"issue":"7","key":"46_CR13","doi-asserted-by":"publisher","first-page":"526","DOI":"10.1007\/s00500-002-0237-z","volume":"7","author":"L. Castro de","year":"2003","unstructured":"de Castro, L., Timmis, J.: Artificial Immune Systems as a Novel Soft Computing Paradigm. Soft Computing, Journal\u00a07(7), 526\u2013544 (2003)","journal-title":"Soft Computing, Journal"},{"key":"46_CR14","doi-asserted-by":"crossref","unstructured":"Dasgupta, D., Forrest, S.: An Anomaly Detection Algorithm Inspired by the Immune System. In: Artificial Immune Systems & their Applications, ch. 14, pp. 262\u2013277. Springer-Verlag, Inc. (January 1999)","DOI":"10.1007\/978-3-642-59901-9_14"},{"issue":"10","key":"46_CR15","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1145\/262793.262811","volume":"40","author":"S. Forrest","year":"1997","unstructured":"Forrest, S., Hofmeyr, S., Somayaji, A.: Computer Immunology. Communications of the ACM\u00a040(10), 88\u201396 (1997)","journal-title":"Communications of the ACM"},{"key":"46_CR16","unstructured":"de Castro, L., Zuben, F.: Artificial Immune Systems: Part I \u2013 Basic Theory and Applications. TR \u2013 DCA 01\/99 (1999)"},{"key":"46_CR17","unstructured":"Forrest, S., Hofmeyr, A.S., Somayaji, A., Longstaff: Sense of self for Unix processes. In: Proceedings of the 1996, IEEE Symposium on Security and Privacy, pp. 120\u2013128 (1996)"},{"key":"46_CR18","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1007\/978-3-540-24701-2_9","volume-title":"Engineering Self-Organising Systems","author":"N. Foukia","year":"2004","unstructured":"Foukia, N., Hassas, S.: Managing Computer Networks Security Through Self-Organization: A Complex System Perspective. In: Di Marzo Serugendo, G., Karageorgos, A., Rana, O.F., Zambonelli, F. (eds.) ESOA 2003. LNCS (LNAI), vol.\u00a02977, pp. 124\u2013138. Springer, Heidelberg (2004)"},{"key":"46_CR19","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1007\/11494676_15","volume-title":"Engineering Self-Organising Systems","author":"N. Foukia","year":"2005","unstructured":"Foukia, N.: IDReAM: Intrusion Detection and Response Executed with Agent Mobility. In: Brueckner, S.A., Di Marzo Serugendo, G., Karageorgos, A., Nagpal, R. (eds.) ESOA 2005. LNCS (LNAI), vol.\u00a03464, pp. 227\u2013239. Springer, Heidelberg (2005)"},{"issue":"3","key":"46_CR20","doi-asserted-by":"publisher","first-page":"252","DOI":"10.1109\/TEVC.2002.1011540","volume":"6","author":"H.K. Paul","year":"2002","unstructured":"Paul, H.K., Paul, W.D., Gregg, G.H., Gary, L.B.: An artificial immune system architecture for computer security applications. IEEE Transactions on Evolutionary Computation\u00a06(3), 252\u2013280 (2002)","journal-title":"IEEE Transactions on Evolutionary Computation"},{"key":"46_CR21","volume-title":"Swarm Intelligence","author":"J. Kennedy","year":"2001","unstructured":"Kennedy, J., Eberhart, R.C.: Swarm Intelligence. Morgan Kaufmann, San Francisco (2001)"},{"issue":"4","key":"46_CR22","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1109\/MCI.2006.329691","volume":"1","author":"Birattari","year":"2006","unstructured":"Birattari, Dorigo, M., Stutzle, T.: Ant colony optimization. IEEE Computational Intelligence Magazine\u00a01(4), 28\u201339 (2006)","journal-title":"IEEE Computational Intelligence Magazine"},{"key":"46_CR23","doi-asserted-by":"crossref","first-page":"1942","DOI":"10.1109\/ICNN.1995.488968","volume-title":"IEEE International Conference on Neural Networks","author":"J. Kennedy","year":"1995","unstructured":"Kennedy, J., Eberhart, R.C.: Particle swarm optimization. In: IEEE International Conference on Neural Networks, pp. 1942\u20131948. IEEE Press, NJ (1995)"},{"key":"46_CR24","doi-asserted-by":"crossref","unstructured":"Zhang, Z., Luo, W., Wang, X.: Designing abstract immune mobile agents for distributed intrusion detection. In: Proceedings of the International Conference on Neural Networks and Brain, ICNN&B 2005, Beijing, vol.\u00a0(2), pp. 748\u2013753 (2005)","DOI":"10.1109\/ICNNB.2005.1614734"},{"key":"46_CR25","series-title":"SCI","doi-asserted-by":"publisher","first-page":"1091","DOI":"10.1007\/978-3-540-78293-3_25","volume-title":"Computational Intelligence: A Compendium","author":"Y. Ishida","year":"2008","unstructured":"Ishida, Y.: The Next Generation of Immunity-Based Systems: From Specific Recognition to Computational Intelligence. In: Fulcher, J., Jain, L.C. (eds.) Computational Intelligence: A Compendium. SCI, vol.\u00a0115, pp. 1091\u20131121. Springer, Heidelberg (2008)"},{"key":"46_CR26","doi-asserted-by":"crossref","unstructured":"Zhongmin, C., Yu, W., Baowen, X.: The algorithm design of agent for detecting and analyzing data in intrusion detection based on immune principle. In: Proceedings of the International Conference on Wireless Communications, Networking and Mobile Computing, Shanghai, pp. 1779\u20131783 (2007)","DOI":"10.1109\/WICOM.2007.446"},{"key":"46_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"316","DOI":"10.1007\/978-3-540-30220-9_26","volume-title":"Artificial Immune Systems","author":"U. Aickelin","year":"2004","unstructured":"Aickelin, U., Greensmith, J., Twycross, J.: Immune System Approaches to Intrusion Detection \u2013 A Review. In: Nicosia, G., Cutello, V., Bentley, P.J., Timmis, J. (eds.) ICARIS 2004. LNCS, vol.\u00a03239, pp. 316\u2013329. Springer, Heidelberg (2004)"}],"container-title":["Communications in Computer and Information Science","Recent Trends in Computer Networks and Distributed Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-34135-9_46.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,8]],"date-time":"2025-04-08T02:29:57Z","timestamp":1744079397000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-34135-9_46"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642341342","9783642341359"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-34135-9_46","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2012]]}}}