{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,4]],"date-time":"2025-05-04T19:10:06Z","timestamp":1746385806808,"version":"3.40.4"},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662450482"},{"type":"electronic","value":"9783662450499"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-662-45049-9_91","type":"book-chapter","created":{"date-parts":[[2014,9,19]],"date-time":"2014-09-19T10:07:14Z","timestamp":1411121234000},"page":"557-561","source":"Crossref","is-referenced-by-count":0,"title":["An Artificial Immune System Approach for Malware Detection"],"prefix":"10.1007","author":[{"given":"Jinquan","family":"Zeng","sequence":"first","affiliation":[]},{"given":"Weiwen","family":"Tang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"91_CR1","unstructured":"McAfee Threats Report: First Quarter (2013), http:\/\/www.mcafee.com\/au\/resources\/reports\/rp-quarterly-threat-q1-2013.pdf"},{"issue":"5","key":"91_CR2","doi-asserted-by":"publisher","first-page":"1208","DOI":"10.4304\/jnw.9.5.1208-1214","volume":"9","author":"W.Q. Fan","year":"2014","unstructured":"Fan, W.Q., Lei, X., An, J.: Obfuscated Malicious Code Detection with Path Condition Analysis. Journal of Networks\u00a09(5), 1208\u20131214 (2014)","journal-title":"Journal of Networks"},{"key":"91_CR3","doi-asserted-by":"crossref","unstructured":"Iker, B., Urko, Z., Simin, N.T.: Crowdroid: Behavior-Based Malware Detection System for Android. In: Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, pp. 15\u201326 (2011)","DOI":"10.1145\/2046614.2046619"},{"key":"91_CR4","doi-asserted-by":"crossref","unstructured":"Schultz, M., Eskin, E., Zadok, E., Stolf, S.: Data Mining Methods for Detection of New Malicious Executables. In: Proceedings of IEEE Symposium on Security and Privacy, pp. 38\u201349. IEEE Computer Society (2001)","DOI":"10.1109\/SECPRI.2001.924286"},{"key":"91_CR5","unstructured":"Forrest, S., Perelson, A.S., Allen, L., Cherukuri, R.: Self-nonself Discrimination in a Computer. In: Proceedings of the 1994 IEEE Symposium on Research in Security and Privacy (1994)"},{"key":"91_CR6","doi-asserted-by":"publisher","first-page":"383","DOI":"10.1023\/A:1026195112518","volume":"4","author":"F.A. Gonzalez","year":"2003","unstructured":"Gonzalez, F.A., Dasgupta, D.: Anomaly Detection Using Real-Valued Negative Selection. Genetic Programming and Evolvable Machines\u00a04, 383\u2013403 (2003)","journal-title":"Genetic Programming and Evolvable Machines"},{"key":"91_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"287","DOI":"10.1007\/978-3-540-24854-5_30","volume-title":"Genetic and Evolutionary Computation \u2013 GECCO 2004","author":"Z. Ji","year":"2004","unstructured":"Ji, Z., Dasgupta, D.: Real-valued Negative Selection Algorithm with Variable-Sized Detectors. In: Deb, K., Tari, Z. (eds.) GECCO 2004. LNCS, vol.\u00a03102, pp. 287\u2013298. Springer, Heidelberg (2004)"},{"issue":"12","key":"91_CR8","doi-asserted-by":"publisher","first-page":"2461","DOI":"10.1007\/s11432-010-4123-5","volume":"53","author":"P.T. Zhang","year":"2010","unstructured":"Zhang, P.T., Wang, W., Tan, Y.: A malware Detection Model Based on A Negative Selection Algorithm with Penalty Factor. Science China Information Sciences\u00a053(12), 2461\u20132471 (2010)","journal-title":"Science China Information Sciences"},{"issue":"2","key":"91_CR9","first-page":"276","volume":"33","author":"H. Peng","year":"2005","unstructured":"Peng, H., Wang, J.: Research of Malicious Executables Detection Method Based on Support Vector Machine. Acta Electronica Sinica\u00a033(2), 276\u2013278 (2005)","journal-title":"Acta Electronica Sinica"}],"container-title":["Communications in Computer and Information Science","Bio-Inspired Computing - Theories and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-45049-9_91","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,4]],"date-time":"2025-05-04T18:32:12Z","timestamp":1746383532000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-662-45049-9_91"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783662450482","9783662450499"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-45049-9_91","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2014]]}}}