{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T23:10:03Z","timestamp":1748733003641,"version":"3.41.0"},"publisher-location":"Berlin, Heidelberg","reference-count":26,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662490136"},{"type":"electronic","value":"9783662490143"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-662-49014-3_53","type":"book-chapter","created":{"date-parts":[[2015,12,23]],"date-time":"2015-12-23T14:41:36Z","timestamp":1450881696000},"page":"598-608","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Negative Selection Algorithm Based Unknown Malware Detection Model"],"prefix":"10.1007","author":[{"given":"Jinquan","family":"Zeng","sequence":"first","affiliation":[]},{"given":"Weiwen","family":"Tang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,12,24]]},"reference":[{"unstructured":"McAfee Threats Report: First Quarter (2013). http:\/\/www.mcafee.com\/au\/resources\/reports\/rp-quarterly-threat-q1-2013.pdf","key":"53_CR1"},{"unstructured":"Symantec: Threat Report (2014). www.symantec.com\/content\/en\/us\/enterprise\/otherresources\/b-istr_main_report_v19_21291018.en-us.pdf","key":"53_CR2"},{"unstructured":"Mcafee and Lab: 2013 Threats Predictions (2013)","key":"53_CR3"},{"issue":"1","key":"53_CR4","first-page":"103","volume":"4","author":"D Uppal","year":"2014","unstructured":"Uppal, D., Mehra, V., Verma, V.: Basic survey on malware analysis, tools and techniques. Int. J. Comput. Sci. Appl. 4(1), 103\u2013112 (2014)","journal-title":"Int. J. Comput. Sci. Appl."},{"issue":"5","key":"53_CR5","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1109\/52.877857","volume":"17","author":"G McGraw","year":"2000","unstructured":"McGraw, G., Morrisett, G.: Attacking malicious code: a report to the infosec research council. IEEE Softw. 17(5), 33\u201341 (2000)","journal-title":"IEEE Softw."},{"issue":"4","key":"53_CR6","first-page":"1251","volume":"3","author":"J Ashish","year":"2014","unstructured":"Ashish, J., Kanak, T., Vivek, K., Dibyahash, B.: Integrating static analysis tools for improving operating system security. Int. J. Comput. Sci. Mob. Comput. 3(4), 1251\u20131258 (2014)","journal-title":"Int. J. Comput. Sci. Mob. Comput."},{"doi-asserted-by":"crossref","unstructured":"Yin, Z.M., Yu, X., Niu, L.: Malicious code detection based on software fingerprint. In: Proceedings of International Conference on Artificial Intelligence and Software Engineering, pp. 212\u2013216 (2013)","key":"53_CR7","DOI":"10.2991\/icaise.2013.45"},{"key":"53_CR8","first-page":"2721","volume":"7","author":"J Kolter","year":"2006","unstructured":"Kolter, J., Maloof, M.: Learning to detect and classify malicious executables in the wild. J. Mach. Learn. Res. 7, 2721\u20132744 (2006)","journal-title":"J. Mach. Learn. Res."},{"key":"53_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1007\/978-3-642-37300-8_10","volume-title":"Detection of Intrusions and Malware, and Vulnerability Assessment","author":"B Schulte","year":"2013","unstructured":"Schulte, B., Andrianakis, H., Sun, K., Stavrou, A.: NetGator: malware detection using program interactive challenges. In: Flegel, U., Markatos, E., Robertson, W. (eds.) DIMVA 2012. LNCS, vol. 7591, pp. 164\u2013183. Springer, Heidelberg (2013)"},{"issue":"16","key":"53_CR10","first-page":"25","volume":"67","author":"IA Saeed","year":"2013","unstructured":"Saeed, I.A., Selamat, A., Abuagoub Ali, M.: A survey on malware and malware detection systems. Int. J. Comput. Appl. 67(16), 25\u201331 (2013)","journal-title":"Int. J. Comput. Appl."},{"issue":"2","key":"53_CR11","first-page":"212","volume":"4","author":"K Lamia","year":"2012","unstructured":"Lamia, K., Mohammadi, A.K.: A review of malicious code detection techniques for mobile devices. Int. J. Comput. Theory Eng. 4(2), 212\u2013216 (2012)","journal-title":"Int. J. Comput. Theory Eng."},{"doi-asserted-by":"crossref","unstructured":"Zahra, B., Hashem, H., Seyed, M.H.F., Ali, H.: A survey on heuristic malware detection techniques. In: Proceedings of the 5th Conference on Information and Knowledge Technology, pp. 113\u2013120 (2013)","key":"53_CR12","DOI":"10.1109\/IKT.2013.6620049"},{"issue":"5","key":"53_CR13","first-page":"1208","volume":"9","author":"W Fan","year":"2014","unstructured":"Fan, W., Lei, X.: Obfuscated malicious code detection with path condition analysis. J. Netw. 9(5), 1208\u20131214 (2014)","journal-title":"J. Netw."},{"unstructured":"Castro, L., Zuben, F.: Artificial immune systems: Part I - basic theory and applications. TR - DCA 01\/99 (1999)","key":"53_CR14"},{"key":"53_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1007\/3-540-45105-6_24","volume-title":"Genetic and Evolutionary Computation - GECCO 2003","author":"D Dasgupta","year":"2003","unstructured":"Dasgupta, D., Yu, S., Majumdar, N.S.: MILA-multilevel immune learning algorithm. In: Cant\u00fa-Paz, E., et al. (eds.) GECCO 2003. LNCS, vol. 2723, pp. 183\u2013194. Springer, Heidelberg (2003)"},{"key":"53_CR16","doi-asserted-by":"publisher","first-page":"2412","DOI":"10.1016\/j.eswa.2010.08.030","volume":"38","author":"D Wang","year":"2011","unstructured":"Wang, D., Zhang, F., Xi, L.: Evolving boundary detector for anomaly detection. Expert Syst. Appl. 38, 2412\u20132420 (2011)","journal-title":"Expert Syst. Appl."},{"issue":"2","key":"53_CR17","doi-asserted-by":"publisher","first-page":"840","DOI":"10.1109\/TPWRS.2014.2330628","volume":"30","author":"FR Alonso","year":"2014","unstructured":"Alonso, F.R., Oliveira, D.Q., Zambroni de Souza, A.C.: Artificial immune systems optimization approach for multi objective distribution system reconfiguration. IEEE Trans. Power Syst. 30(2), 840\u2013847 (2014)","journal-title":"IEEE Trans. Power Syst."},{"issue":"19","key":"53_CR18","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1016\/j.neucom.2012.08.076","volume":"148","author":"P Zhang","year":"2015","unstructured":"Zhang, P., Tan, Y.: Immune cooperation mechanism based learning framework. Neurocomputing 148(19), 158\u2013166 (2015)","journal-title":"Neurocomputing"},{"key":"53_CR19","volume-title":"Computer Immunology","author":"T Li","year":"2004","unstructured":"Li, T.: Computer Immunology. Publishing House of Electronics Industry, Beijing (2004)"},{"issue":"2","key":"53_CR20","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1162\/evco.2007.15.2.223","volume":"15","author":"J Zhou","year":"2007","unstructured":"Zhou, J., Dasgupta, D.: Revisiting negative selection algorithms. Evol. Comput. 15(2), 223\u2013251 (2007)","journal-title":"Evol. Comput."},{"unstructured":"Forrest, S., Perelson, A., Allen, L., Cherukuri, R.: Self-nonself discrimination in a computer. In: Proceedings of the 1994 IEEE Symposium on Research in Security and Privacy. IEEE Computer Society Press (1994)","key":"53_CR21"},{"doi-asserted-by":"crossref","unstructured":"Dasgupta, D., Yu, S., Majumdar, N.S.: MILA-multilevel immune learning algorithm. In: Proceedings of the 2003 Genetic and Evolutionary Computation Conference, pp. 183\u2013194 (2003)","key":"53_CR22","DOI":"10.1007\/3-540-45105-6_24"},{"key":"53_CR23","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1109\/TEVC.2002.1011541","volume":"6","author":"D Dasgupta","year":"2002","unstructured":"Dasgupta, D., Gonzalez, F.: An immunity based technique to characterize intrusions in computer network. IEEE Trans. Evol. Comput. 6, 281\u2013291 (2002)","journal-title":"IEEE Trans. Evol. Comput."},{"key":"53_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"287","DOI":"10.1007\/978-3-540-24854-5_30","volume-title":"Genetic and Evolutionary Computation \u2013 GECCO 2004","author":"Z Ji","year":"2004","unstructured":"Ji, Z., Dasgupta, D.: Real-valued negative selection algorithm with variable-sized detectors. In: Deb, K., Tari, Z. (eds.) GECCO 2004. LNCS, vol. 3102, pp. 287\u2013298. Springer, Heidelberg (2004)"},{"key":"53_CR25","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1016\/j.knosys.2012.01.004","volume":"30","author":"MG Gong","year":"2012","unstructured":"Gong, M.G., Zhang, J., Ma, J., Jiao, L.: An efficient negative selection algorithm with further training for anomaly detection. Knowledge-Based Syst. 30, 185\u2013191 (2012)","journal-title":"Knowledge-Based Syst."},{"key":"53_CR26","doi-asserted-by":"publisher","first-page":"515","DOI":"10.1016\/j.neucom.2014.08.022","volume":"149","author":"D Li","year":"2015","unstructured":"Li, D., Liu, S.L., Zhang, H.: A negative selection algorithm with online adaptive learning under small samples for anomaly detection. Neurocomputing 149, 515\u2013525 (2015)","journal-title":"Neurocomputing"}],"container-title":["Communications in Computer and Information Science","Bio-Inspired Computing -- Theories and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-49014-3_53","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T22:39:30Z","timestamp":1748731170000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-662-49014-3_53"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783662490136","9783662490143"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-49014-3_53","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"24 December 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}