{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T16:21:14Z","timestamp":1742919674017,"version":"3.40.3"},"publisher-location":"New Delhi","reference-count":17,"publisher":"Springer India","isbn-type":[{"type":"print","value":"9788132217671"},{"type":"electronic","value":"9788132217688"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-81-322-1768-8_46","type":"book-chapter","created":{"date-parts":[[2014,3,4]],"date-time":"2014-03-04T00:11:09Z","timestamp":1393891869000},"page":"517-527","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Genetic Algorithm Approach for Non-self OS Process Identification"],"prefix":"10.1007","author":[{"given":"Amit","family":"Kumar","sequence":"first","affiliation":[]},{"given":"Shishir","family":"Kumar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,3,4]]},"reference":[{"issue":"4","key":"46_CR1","doi-asserted-by":"publisher","first-page":"443","DOI":"10.1162\/106365600568257","volume":"8","author":"SA Hofmeyr","year":"2000","unstructured":"Hofmeyr, S.A., Forrest, S.: Architecture of an artificial immune system. Evol. Comput. 8(4), 443\u2013473 (2000). doi:10.1162\/106365600568257","journal-title":"Evol. Comput."},{"issue":"3","key":"46_CR2","doi-asserted-by":"crossref","first-page":"249","DOI":"10.1162\/artl.1994.1.3.249","volume":"1","author":"E.H. Spafford","year":"1994","unstructured":"Spafford, E.H.: Computer viruses as artificial life. J. Artif. Life 1(3), 249\u2013265 (1994). (http:\/\/spaf.cerias.purdue.edu\/tech-reps\/985.pdf) (MIT Press)","journal-title":"J. Artif. Life"},{"volume-title":"Artificial Immune Systems and their Applications","year":"1999","key":"46_CR3","unstructured":"Dasgupta, D. (ed.): Artificial Immune Systems and their Applications. Springer, Berlin (1999)"},{"key":"46_CR4","unstructured":"Lau, L.W.Y.: Computer immunology, The Department of Information Technology and Electrical Engineering, The University of Queensland. http:\/\/download.adamas.ai\/dlbase\/ebooks\/VX_related\/Computer%20Immunology(Lau).pdf (2002)"},{"key":"46_CR5","doi-asserted-by":"crossref","unstructured":"Farmer, J.D., Packard, N.H., Perelson, A.S.: The immune system, adaptation and machine learning. In: Proceedings of the Fifth Annual International Conference in Physica D: Nonlinear Phenomena, vol. 22, no. 1\u20133, pp. 187\u2013204. Elsevier, Amsterdam (1986)","DOI":"10.1016\/0167-2789(86)90240-X"},{"key":"46_CR6","unstructured":"Bachmayer, S. (eds.): Artificial immune system. In: ch XI, pp. 209\u2013230. Group Idea Publishing Hershey (2006) http:\/\/www.cs.helsinki.fi\/u\/niklande\/opetus\/SemK07\/paper\/bachmayer.pdf"},{"issue":"3","key":"46_CR7","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1136\/jamia.2000.0070028","volume":"7","author":"J.H. Carter","year":"2000","unstructured":"Carter, J.H.: The immune system as a model for pattern recognition and classification. J. Am. Med. Inf. Assoc. 7(3), 28\u201341(2000)","journal-title":"J. Am. Med. Inf. Assoc."},{"key":"46_CR8","doi-asserted-by":"crossref","unstructured":"Percus, J.K., Percus, O.E., Perelson, A.S.: Predicting the size of the antibody-combining region from consideration of efficient self\/nonself discrimination. In: Proceedings of the National Academy of Science, vol. 90, pp. 1691\u20131695. National Acad Sciences (1993)","DOI":"10.1073\/pnas.90.5.1691"},{"key":"46_CR9","unstructured":"Forrest, S., Hofmeyr, S.A., Somayaji, A.B., Longstaff, T.A.: A sense of self for UNIX processes, submitted to the IEEE Symposium on Security and Privacy (1996)"},{"key":"46_CR10","unstructured":"Forrest, S., Perelson, A.S.: Self non-self discrimination in a computer. In: Proceedings of the IEEE Symposium on Research in Security and Privacy IEEE (1994)"},{"key":"46_CR11","unstructured":"Niu, J.: Process Description and Control, CSc33200: Operating Systems, CS-CCNY, Fall. http:\/\/www.sci.brooklyn.cuny.edu\/~jniu\/teaching\/csc33200\/csc33200.html (2003)"},{"key":"46_CR12","doi-asserted-by":"crossref","unstructured":"Percus, J.K., Percus, O.E., Perelson, A.S.: Probability of self-nonself discrimination. In: Theoretical and Experimental Insights into Immunology, series vol. 66, pp. 63\u201370. NATO ASI (1992)","DOI":"10.1007\/978-3-642-76977-1_5"},{"key":"46_CR13","doi-asserted-by":"crossref","unstructured":"Eiben, A.E, Raue, P.E., Ruttkay, Z.: Genetic algorithms with multi-parent recombination. In: PPSN III: Proceedings of the International Conference on Evolutionary Computation. The Third Conference on Parallel Problem Solving from Nature, vol. 866, pp. 78\u201387. Springer, Berlin (1994)","DOI":"10.1007\/3-540-58484-6_252"},{"key":"46_CR14","doi-asserted-by":"crossref","unstructured":"Rojas, R.: Genetic Algorithm from Neutral Networks: A Systematic Introduction, pp. 427\u2013448. Springer, Berlin (1996)","DOI":"10.1007\/978-3-642-61068-4_17"},{"key":"46_CR15","doi-asserted-by":"publisher","unstructured":"Dal, D., Abraham, S., Abraham, A., Sanyal, S, Sanglikar, M.: Evolution induced secondary immunity: an artificial immune system based intrusion detection system. IEEE 7th Computer Information Systems and Industrial Management Applications. doi: 10.1109\/CISIM.2008.31 pp. 65\u201370. IEEE (2008)","DOI":"10.1109\/CISIM.2008.31"},{"key":"46_CR16","doi-asserted-by":"crossref","unstructured":"Darmoul, S., Pierrevalt, H., Gabouj, S.H.: scheduling using artificial immune system metaphors: a review. In: Proceedings of the International Conference on Service Systems and Service Management, pp. 1150\u20131155. IEEE (2006)","DOI":"10.1109\/ICSSSM.2006.320670"},{"key":"46_CR17","unstructured":"Matloff, N.: Unix processes, Department of Computer Science University of California at Davis. http:\/\/heather.cs.ucdavis.edu\/~matloff\/unix.html (2004)"}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of the Third International Conference on Soft Computing for Problem Solving"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-81-322-1768-8_46","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,19]],"date-time":"2023-02-19T23:14:32Z","timestamp":1676848472000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-81-322-1768-8_46"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9788132217671","9788132217688"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-81-322-1768-8_46","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"4 March 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}