{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T13:25:49Z","timestamp":1725715549957},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642362514"},{"type":"electronic","value":"9783642362521"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-36252-1_17","type":"book-chapter","created":{"date-parts":[[2013,2,9]],"date-time":"2013-02-09T09:16:01Z","timestamp":1360401361000},"page":"181-190","source":"Crossref","is-referenced-by-count":1,"title":["Research on Network Malicious Code Dendritic Cell Immune Algorithm Based on Fuzzy Weighted Support Vector Machine"],"prefix":"10.1007","author":[{"given":"Peng","family":"Li","sequence":"first","affiliation":[]},{"given":"Ruchuan","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Yanting","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Qiuyu","family":"Dai","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"17_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1007\/978-3-540-45192-1_15","volume-title":"Artificial Immune Systems","author":"U. Aickelin","year":"2003","unstructured":"Aickelin, U., Bentley, P., Cayzer, S., Kim, J., McLeod, J.: Danger Theory: The Link between AIS and IDS? In: Timmis, J., Bentley, P.J., Hart, E. (eds.) ICARIS 2003. LNCS, vol.\u00a02787, pp. 147\u2013155. Springer, Heidelberg (2003)"},{"issue":"4","key":"17_CR2","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1109\/MCI.2006.329705","volume":"1","author":"D. Dasgupta","year":"2006","unstructured":"Dasgupta, D.: Advances in Artificial Immune Systems. Computational Intelligence Magazine\u00a01(4), 40\u201349 (2006)","journal-title":"Computational Intelligence Magazine"},{"key":"17_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1007\/11536444_9","volume-title":"Artificial Immune Systems","author":"J. Twycross","year":"2005","unstructured":"Twycross, J., Aickelin, U.: Towards a Conceptual Framework for Innate Immunity. In: Jacob, C., Pilat, M.L., Bentley, P.J., Timmis, J.I. (eds.) ICARIS 2005. LNCS, vol.\u00a03627, pp. 112\u2013125. Springer, Heidelberg (2005)"},{"issue":"4","key":"17_CR4","doi-asserted-by":"publisher","first-page":"413","DOI":"10.1007\/s11047-006-9026-4","volume":"6","author":"J. Kim","year":"2007","unstructured":"Kim, J., Bentley, P., Aickelin, U., Greensmith, J., Tedesco, G., Twycross, J.: Immune system approaches to intrusion detection - a review. Natural Computing\u00a06(4), 413\u2013466 (2007)","journal-title":"Natural Computing"},{"key":"17_CR5","doi-asserted-by":"crossref","unstructured":"Al-Hammadi, Y., Aickelin, U., Greensmith, J.: DCA for detecting bots. In: IEEE World Congress on Computational Intelligence, WCCI 2008, Hong Kong, China, pp. 1\u201310 (2008)","DOI":"10.1109\/CEC.2008.4631034"},{"issue":"7","key":"17_CR6","first-page":"2680","volume":"28","author":"F.-X. Sun","year":"2011","unstructured":"Sun, F.-X., Jin, X.-T.: Immune danger theory based quantitative model for network security situation awareness. Application Research of Computers\u00a028(7), 2680\u20132686 (2011) (in Chinese)","journal-title":"Application Research of Computers"},{"issue":"1","key":"17_CR7","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/s10462-010-9159-9","volume":"34","author":"J.-Q. Zheng","year":"2010","unstructured":"Zheng, J.-Q., Chen, Y.-F., Zhang, W.: A Survey of artificial immune applications. Artificial Intelligence Review\u00a034(1), 19\u201334 (2010)","journal-title":"Artificial Intelligence Review"},{"key":"17_CR8","doi-asserted-by":"crossref","unstructured":"Jain, P., Goyal, S.: An Adaptive Intrusion Prevention System Based on Immunity. In: International Conference on Advances in Computing, Control, and Telecommunication Technologies, Trivandrum, Kerala, India, pp. 759\u2013763 (2009)","DOI":"10.1109\/ACT.2009.192"},{"key":"17_CR9","doi-asserted-by":"crossref","unstructured":"Zeng, Li, T.: A Novel Computer Virus Detection Method from Ideas of Immunology. In: International Conference on Multimedia Information Networking and Security, Wuhan, China, pp. 412\u2013416 (2009)","DOI":"10.1109\/MINES.2009.278"},{"issue":"9","key":"17_CR10","first-page":"52","volume":"25","author":"Y. Wei","year":"2008","unstructured":"Wei, Y., Zhang, J., Xu, H.: The Application of Immune Theory to Virus Detection. Computer Applications and Software\u00a025(9), 52\u201354 (2008)","journal-title":"Computer Applications and Software"},{"issue":"1","key":"17_CR11","first-page":"288","volume":"82","author":"Z. Chen","year":"2008","unstructured":"Chen, Z., Shen, C., Wu, X.: A Crypto-based Immunization Model against Malicious Code. Computer Science\u00a082(1), 288\u2013289 (2008) (in Chinese)","journal-title":"Computer Science"},{"issue":"1","key":"17_CR12","first-page":"136","volume":"33","author":"L.-X. Peng","year":"2012","unstructured":"Peng, L.-X., Xie, D.-Q., Fu, Y.-F., Xiong, W., Shen, Y.-L.: Automated intrusion response system model based on danger theory. Journal on Communications\u00a033(1), 136\u2013144 (2012) (in Chinese)","journal-title":"Journal on Communications"},{"key":"17_CR13","doi-asserted-by":"crossref","unstructured":"Aickelin, U., Cayzer, S.: The Danger Theory and Its Application to Artificial Immune Systems. In: Proceedings of the 1st Internet Conference on Artificial Immune Systems, ICARIS 2002, Canterbury, UK, pp. 141\u2013148 (2002)","DOI":"10.2139\/ssrn.2832054"},{"key":"17_CR14","doi-asserted-by":"crossref","unstructured":"Kim, J., Greensmith, J., Twycross, J., Aickelin, U.: Malicious Code Execution Detection and Response Immune System inpired by the Danger Theory. In: Proceedings of Adaptive and Resilient Computing Security Workshop, ARCS 2005, Santa Fe, USA, pp. 1\u20134 (2005)","DOI":"10.2139\/ssrn.2832006"},{"key":"17_CR15","doi-asserted-by":"crossref","unstructured":"Meng, Q., Zhao, W.: Study on fault diagnosis algorithm based on artificial immune danger theory. In: International Conference on Mechanic Automation and Control Engineering, MACE 2010, Hangzhou, China, pp. 5997\u20136000 (2010)","DOI":"10.1109\/MACE.2010.5536845"},{"key":"17_CR16","unstructured":"Matzinge, P.: The Real Function of the Immune System or Tolerance and Four D\u2019s (Danger, Death, Destruction and Distress), \n                  \n                    http:\/\/cmmg.biosci.wayne.edu\/asg\/polly.html"},{"key":"17_CR17","first-page":"81","volume-title":"Support Vector Machine: Theory, Algorithm and Continuation","author":"N. Deng","year":"2009","unstructured":"Deng, N., Tian, Y.: Support Vector Machine: Theory, Algorithm and Continuation, pp. 81\u2013111. Science Press, Beijing (2009) (in Chinese)"},{"issue":"1","key":"17_CR18","first-page":"115","volume":"40","author":"P. Li","year":"2012","unstructured":"Li, P., Wang, R.-C., Gao, D.-H.: Research on Rootkit Dynamic Detection based on Fuzzy Pattern Recognition and Support Virtual Machine Technology. Acta Electronica Sinica\u00a040(1), 115\u2013120 (2012) (in Chinese)","journal-title":"Acta Electronica Sinica"},{"key":"17_CR19","first-page":"191","volume-title":"Thoery and Application of Unascertained Support Vector Machine","author":"Z. Yang","year":"2007","unstructured":"Yang, Z., Liu, G.: Thoery and Application of Unascertained Support Vector Machine, pp. 191\u2013193. Science Press, Beijing (2007) (in Chinese)"},{"key":"17_CR20","doi-asserted-by":"crossref","unstructured":"Twycross, J., Aickelin, U.: Libtissue - implementing innate immunity. In: IEEE Congress on Evolutionary Computation, Sheraton Vancouver Wall Centre, Vancouver, BC, Canada, pp. 499\u2013506 (2006)","DOI":"10.2139\/ssrn.2831992"}],"container-title":["Communications in Computer and Information Science","Advances in Wireless Sensor Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-36252-1_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,11]],"date-time":"2019-05-11T04:35:34Z","timestamp":1557549334000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-36252-1_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642362514","9783642362521"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-36252-1_17","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2013]]}}}