{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T03:07:16Z","timestamp":1761620836882,"version":"3.28.0"},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/cec.2002.1004384","type":"proceedings-article","created":{"date-parts":[[2003,6,25]],"date-time":"2003-06-25T16:30:39Z","timestamp":1056558639000},"page":"1027-1032","source":"Crossref","is-referenced-by-count":10,"title":["The computer defense immune system: current and future research in intrusion detection"],"prefix":"10.1109","volume":"2","author":[{"given":"K.P.","family":"Anchor","sequence":"first","affiliation":[]},{"given":"P.D.","family":"Williams","sequence":"additional","affiliation":[]},{"given":"G.H.","family":"Gunsch","sequence":"additional","affiliation":[]},{"given":"G.B.","family":"Lamont","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","article-title":"Writing snort rules: How to write snort rules and keep your sanity","author":"roesch","year":"2001","journal-title":"World Wide Web page"},{"key":"17","doi-asserted-by":"crossref","DOI":"10.1109\/TEVC.2002.1011540","article-title":"A distributed agent based architecture for computer security applications","author":"harmer","year":"2002","journal-title":"IEEE Transactions on Evolutionary Computation"},{"journal-title":"Machine Learning","year":"1997","author":"mitchell","key":"22"},{"key":"18","first-page":"167","volume":"11","author":"lamont","year":"1999","journal-title":"New Ideas in Optimization Chapter"},{"key":"15","doi-asserted-by":"crossref","first-page":"151","DOI":"10.3233\/JCS-980109","article-title":"Intrusion detection using a sequence of system calls","volume":"6","author":"hofmeyr","year":"1998","journal-title":"Journal of Computer Security"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1145\/283699.283742"},{"key":"13","first-page":"361","article-title":"Immunology as information processing","author":"forrest","year":"2001","journal-title":"Design Principles for the Immune Systems and Other Distributed Autonomous System"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1162\/106365600568257"},{"key":"11","article-title":"A new approach to intrusion detection","author":"dasgupta","year":"2001","journal-title":"University of Memphis C S Technical Report No CS-01-011"},{"key":"12","article-title":"An intelligent decision support system for intrusion detection and response","author":"dasgupta","year":"2001","journal-title":"Lecture Notes in Computer Science Proceedings of the International Workshop on Mathematical Methods Models and Architectures for Computer Networks Security (MMM-ACNS)"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2002.1004484"},{"key":"3","first-page":"117","article-title":"Cdis: Towards a computer immune system for detecting network intrusions","volume":"133","author":"williams","year":"2001","journal-title":"Proceedings of the 4th International Symposium Recent Advances in Intrusion Detection 2001"},{"key":"20","article-title":"Darpa intrusion detection evaluation","author":"lippmann","year":"1999","journal-title":"Massachusetts Institute of Technology World Wide Web Site"},{"key":"2","article-title":"A distributed agent architecture for a computer virus immune system","author":"harmer","year":"2000","journal-title":"Graduate School of Engineering and Management Air Force Institute of Technology (AU)"},{"key":"10","article-title":"Immunity-based intrusion detection systems: A general framework","author":"dasgupta","year":"1999","journal-title":"Proceedings of the 22nd National Information Systems Security Conference (NISSC)"},{"key":"1","article-title":"State of the practice of intrusion detection technologies","author":"allen","year":"1999","journal-title":"Tech Rep CMU\/SEI-99-TR-028"},{"key":"7","article-title":"The artificial immune model for network intrusion detection","author":"kim","year":"1999","journal-title":"7th European Conference on Intelligent Techniques and Soft Computing (EUFIT'99)"},{"journal-title":"Modelling & Analysis of Computer Immune Systems Using Evolutionary Algorithms Rev 2","year":"1999","author":"marmeistein","key":"6"},{"key":"5","article-title":"Artificial immune systems: A bibliography","author":"dasgupta","year":"2001","journal-title":"Tech Rep CS-01-002"},{"journal-title":"Artificial Immune Systems","year":"1998","author":"dasgupta","key":"4"},{"key":"9","first-page":"1330","article-title":"An evaluation of negative selection in an artificial immune system for network intrusion detection","author":"kim","year":"2001","journal-title":"Genetic and Evolutionary Computation Conference 2001 (GECCO-2001)"},{"key":"8","first-page":"1244","article-title":"Towards an artificial immune system for network intrusion detection: An investigation of clonal selection with a negative selection operator","author":"kim","year":"2001","journal-title":"Congress on Evolutionary Computation (CEC-2001)"}],"event":{"name":"2002 World Congress on Computational Intelligence - WCCI'02","acronym":"CEC-02","location":"Honolulu, HI, USA"},"container-title":["Proceedings of the 2002 Congress on Evolutionary Computation. CEC'02 (Cat. No.02TH8600)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/7875\/21687\/01004384.pdf?arnumber=1004384","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,2,24]],"date-time":"2018-02-24T17:49:09Z","timestamp":1519494549000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1004384\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/cec.2002.1004384","relation":{},"subject":[]}}