{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T03:10:21Z","timestamp":1761621021825},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"1-4","license":[{"start":{"date-parts":[[2009,10,24]],"date-time":"2009-10-24T00:00:00Z","timestamp":1256342400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Artif Intell Rev"],"published-print":{"date-parts":[[2009,12]]},"DOI":"10.1007\/s10462-009-9131-8","type":"journal-article","created":{"date-parts":[[2009,10,23]],"date-time":"2009-10-23T00:12:17Z","timestamp":1256256737000},"page":"13-43","source":"Crossref","is-referenced-by-count":16,"title":["Intelligent agent based artificial immune system for computer security\u2014a review"],"prefix":"10.1007","volume":"32","author":[{"given":"Sivakumar","family":"Ramakrishnan","sequence":"first","affiliation":[]},{"given":"Sujatha","family":"Srinivasan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2009,10,24]]},"reference":[{"issue":"4","key":"9131_CR1","first-page":"160","volume":"8","author":"MR Ahmedi","year":"2008","unstructured":"Ahmedi MR, Maleki D (2008) An intrusion detection technique using co-co immune system for distributed data networks (CoCo-ISD). IJCSNS Int J Comput Sci Netw Sec 8(4): 160\u2013169","journal-title":"IJCSNS Int J Comput Sci Netw Sec"},{"key":"9131_CR2","doi-asserted-by":"crossref","unstructured":"Aickelin U, Cayzer S (2002) The danger theory and its application to artificial immune systems. In: Proceedings of the 1st internat. Conference on aRtificial immune systems (ICARIS-2002), UK, Canterbury, pp 141\u2013148","DOI":"10.2139\/ssrn.2832054"},{"key":"9131_CR3","doi-asserted-by":"crossref","unstructured":"Aickelin U, Greensmith J, Twycross J (2004) Immune system approaches to intrusion detection\u2014a review. In: Nicosia G et\u00a0al (eds) ICARIS 2004, LNCS 3239. Springer, pp 316\u2013329","DOI":"10.1007\/978-3-540-30220-9_26"},{"key":"9131_CR4","unstructured":"Baumer C, Breugst M, Choy S, Magedanz T (2004) Grasshopper\u2014a universal agent platform based on OMG MASIF and FIPA standards, Grasshopper developed by the ikv++ technologies. Accessed on http:\/\/213.160.69.23\/grasshopper-website\/"},{"key":"9131_CR5","doi-asserted-by":"crossref","unstructured":"Boukerche A, Machado RB, Juca KRL, Sobral JBM, Notare MSMA (2007) An agent based and biological inspired real-time intrusion detection and security model for computer network operations. Comput Commun (30), 2649\u20132660, Elsevier","DOI":"10.1016\/j.comcom.2007.03.008"},{"key":"9131_CR6","doi-asserted-by":"crossref","unstructured":"Bye R, Schmidt S, Luther K, Albayrak S (2008) Application-level simulation for network security. In: Proceedings of the 1st international conference on simulation tools and techniques for communications, networks and systems & workshops, March 03\u201307, 2008, France, Marseille","DOI":"10.4108\/ICST.SIMUTOOLS2008.2961"},{"key":"9131_CR7","doi-asserted-by":"crossref","unstructured":"Byrski A, Carvalho M (2008) Agent-based immunological intrusion detection system for mobile Ad-Hoc networks. In: Bubak M et\u00a0al (eds) ICCS 2008, Springer, pp 584\u2013593","DOI":"10.1007\/978-3-540-69389-5_66"},{"issue":"1","key":"9131_CR8","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1145\/643477.643479","volume":"3","author":"J Claessens","year":"2003","unstructured":"Claessens J, Preneel B, Vandewalle J (2003) (How) Can mobile agents do secure electronic transactions on untrusted hosts? A survey of the security issues and the current solutions. ACM Trans Int Technol 3(1): 28\u201348","journal-title":"ACM Trans Int Technol"},{"key":"9131_CR9","unstructured":"Dasgupta D (1999) Immunity-based intrusion detection system : a general framework. In: Proceedings of 22nd national information systems security conference, Arlington, Virginia, USA, pp 147\u2013160"},{"key":"9131_CR10","doi-asserted-by":"crossref","unstructured":"Dasgupta D, Ji Z, Gonzalez F (2003) Artificial immune system (AIS) research in the last five years. In: Proceedings of congress on evolutionary computation conference (CEC). Canberra, Australia: December, pp 123\u2013130","DOI":"10.1109\/CEC.2003.1299565"},{"key":"9131_CR11","doi-asserted-by":"crossref","unstructured":"Gong X, Li T, Liang G, Wang T, Yang J, Hu X (2006a) Immunity and mobile agent based grid intrusion detection. In: Huang D-S, Li K, Irwin GW (eds) Proceedings of ICIC 2006, LNBI 4115, Springer, pp 651\u2013659","DOI":"10.1007\/11816102_69"},{"key":"9131_CR12","doi-asserted-by":"crossref","unstructured":"Gong X, Li T, Wang T, Yang J, Liu S, Liang G (2006b) An immune mobile agent based grid intrusion detection model. In: Wang T-D et\u00a0al (eds) Proceedings of SEAL 2006, LNCS 4247, Springer, pp 112\u2013119","DOI":"10.1007\/11903697_15"},{"key":"9131_CR13","doi-asserted-by":"crossref","unstructured":"Gong X, Li T, Wang T, Yang J, Liang G, Hu X (2006c) Grid intrusion detection based on immune agent. In: Jiao L et\u00a0al (eds) Proceedings of ICNC 2006, Part II, LNCS 4222, Springer, pp 73\u201382","DOI":"10.1007\/11881223_10"},{"key":"9131_CR14","doi-asserted-by":"crossref","unstructured":"Greensmith J, Aickelin U, Cayzer S (2008) Detecting danger: the dendritic cell algorithm. Robust intelligent systems, Springer, London, pp 89\u2013112","DOI":"10.1007\/978-1-84800-261-6_5"},{"issue":"3","key":"9131_CR15","doi-asserted-by":"crossref","first-page":"252","DOI":"10.1109\/TEVC.2002.1011540","volume":"6","author":"PK Harmer","year":"2002","unstructured":"Harmer PK, Williams PD, Gunsch GH, Lamont GB (2002) An artificial immune system architecture for computer security applications. IEEE Trans Evol Comput 6(3): 252\u2013280","journal-title":"IEEE Trans Evol Comput"},{"key":"9131_CR16","unstructured":"Hilker M (2008) Next challenges in bringing artificial immune systems to production in network security. In: Proceedings of BIONETICS, Budapest, Hungary, Arxiv preprint arXiv:0805.1786, 2008- arxiv.org"},{"key":"9131_CR17","doi-asserted-by":"crossref","unstructured":"Hu Q, Qui J, Song G (2007) Immune multi-agent network intrusion defense model. In: Proceedings of the third international conference on natural computation (ICNC 2007), pp 2875\u20132879","DOI":"10.1109\/ICNC.2007.434"},{"key":"9131_CR18","doi-asserted-by":"crossref","unstructured":"Ishida Y (2008) The next generation of immunity-based systems: from specific recognition to computational intelligence. Studies in computational intelligence (SCI), vol 115. Springer, Berlin, pp 1091\u20131121","DOI":"10.1007\/978-3-540-78293-3_25"},{"key":"9131_CR19","doi-asserted-by":"crossref","unstructured":"Kim J, Bentley J P, Aickelin U, Greensmith J, Tedesco G, Twycross J (2007) Immune system approaches to intrusion detection\u2014a review. Natural computing, vol 6. Springer, Berlin, pp 413\u2013466","DOI":"10.1007\/s11047-006-9026-4"},{"key":"9131_CR20","doi-asserted-by":"crossref","unstructured":"Le Boudec J-Y, Sarajanovic S (2004) An artificial immune system approach to misbehavior detection in mobile Ad-Hoc networks. In: Proceedings of Bio-ADIT 2004 (The first international workshop on biologically inspired approaches to advanced information technology), Lausanne, Switzerland, pp 96\u2013111","DOI":"10.1007\/978-3-540-27835-1_29"},{"key":"9131_CR21","doi-asserted-by":"crossref","unstructured":"Liu S, Li T, Wang D, Zhao K, Gong X, Hu X, Xu C, Liang G (2006) Immune multi-agent active defense model for network intrusion. In: Wang et\u00a0al (eds) SEAL 2006, LNCS 4247, Springer, pp 104\u2013111","DOI":"10.1007\/11903697_14"},{"issue":"1","key":"9131_CR22","first-page":"167","volume":"12","author":"S Liu","year":"2007","unstructured":"Liu S, Li T, Wang D, Hu X, Xu C (2007) Multi-agent network intrusion active defense model based on immune theory, Wuhan University. J Nat Sci 12(1): 167\u2013171","journal-title":"J Nat Sci"},{"key":"9131_CR23","doi-asserted-by":"crossref","unstructured":"Luther K, Bye R, Alpcan T, Muller A, Albayrak S (2007) A cooperative AIS framework for intrusiondetection. In: Proceedings of the international conference on communications, Glasgow, pp 1409\u20131416, doi: 10.1109\/ICC.2007.237","DOI":"10.1109\/ICC.2007.237"},{"key":"9131_CR24","doi-asserted-by":"crossref","unstructured":"Machado RB, Boukerche A, Sobral JBM, Juca KRL, Notare Mirela SMA (2005) A hybrid artificial immune and mobile agent intrusion detection based model for computer network operations. In: Proceedings of the 19th IEEE international parallel and distributed processing symposium (IPDPS\u201905), 1530-2075\/05","DOI":"10.1109\/IPDPS.2005.33"},{"key":"9131_CR25","doi-asserted-by":"crossref","unstructured":"Okamoto T, Ishida Y (2007) Framework of an immunity-based anomaly detection system for user behavior. In: Apolloni B et\u00a0al (eds) KES 2007\/ WIRN 2007, LNAI 4694, Springer, pp 821\u2013829","DOI":"10.1007\/978-3-540-74829-8_100"},{"key":"9131_CR26","doi-asserted-by":"crossref","unstructured":"Watanabe Y, lshida Y (2004) Mutual tests using immunity-based diagnostic mobile agents in distributed intrusion detection systems. In: Proceedings of artificial life robotics (ISAROB, 2004), vol 8, pp 163\u2013167","DOI":"10.1007\/s10015-004-0305-9"},{"issue":"7","key":"9131_CR27","doi-asserted-by":"crossref","first-page":"478","DOI":"10.3844\/jcssp.2007.478.486","volume":"3","author":"RV Yampolskiy","year":"2007","unstructured":"Yampolskiy RV, Govindaraju V (2007) Computer security: a survey of methods and systems. J Comput Sci 3(7): 478\u2013486","journal-title":"J Comput Sci"},{"key":"9131_CR28","doi-asserted-by":"crossref","unstructured":"Yang J, Liu XJ, Li T, Liang G, Liu S (2009) Distributed agents model for intrusion detection based on AIS. Knowledge-based systems 22(2):115\u2013119, Elsevier","DOI":"10.1016\/j.knosys.2008.07.005"},{"key":"9131_CR29","doi-asserted-by":"crossref","unstructured":"Yeom K-W, Park J-H (2005) An immune system inspired approach of collaborative intrusion detection system using mobile agents in wireless ad hoc networks. In: Hao Y et\u00a0al (eds) CIS 2005, Springer, pp 204\u2013211","DOI":"10.1007\/11596981_31"},{"key":"9131_CR30","doi-asserted-by":"crossref","unstructured":"Yue X, Abraham A, Chi Z-X, Hao Y-Y, Mo H (2006) Artificial immune system inspired behavior-based anti-spam filter. Soft Comput 11:729\u2013740, Springer","DOI":"10.1007\/s00500-006-0116-0"},{"key":"9131_CR31","doi-asserted-by":"crossref","unstructured":"Zhang Z, Luo W, Wang X (2005) Designing abstract immune mobile agents for distributed intrusion detection. In: Proceedings of the international conference on neural networks and brain, ICNN&B \u201805, Beijing, (2):748\u2013753. doi: 10.1109\/ICNNB.2005.1614734","DOI":"10.1109\/ICNNB.2005.1614734"},{"key":"9131_CR32","unstructured":"Zhongmin C, Yu W, Baowen X (2007) The algorithm design of agent for detecting and analyzing data in intrusion detection based on immune principle. In: Proceedings of the international conference on wireless communications, Networking and mobile computing. WiCom 2007, Shanghai, pp 1779\u20131783"}],"container-title":["Artificial Intelligence Review"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10462-009-9131-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10462-009-9131-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10462-009-9131-8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,29]],"date-time":"2019-05-29T17:45:07Z","timestamp":1559151907000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10462-009-9131-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,10,24]]},"references-count":32,"journal-issue":{"issue":"1-4","published-print":{"date-parts":[[2009,12]]}},"alternative-id":["9131"],"URL":"https:\/\/doi.org\/10.1007\/s10462-009-9131-8","relation":{},"ISSN":["0269-2821","1573-7462"],"issn-type":[{"value":"0269-2821","type":"print"},{"value":"1573-7462","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009,10,24]]}}}