{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,6]],"date-time":"2024-08-06T02:50:49Z","timestamp":1722912649679},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/cec.2002.1004484","type":"proceedings-article","created":{"date-parts":[[2003,6,25]],"date-time":"2003-06-25T20:30:39Z","timestamp":1056573039000},"page":"1618-1623","source":"Crossref","is-referenced-by-count":4,"title":["An evolutionary programming approach for detecting novel computer network attacks"],"prefix":"10.1109","volume":"2","author":[{"given":"K.P.","family":"Anchor","sequence":"first","affiliation":[]},{"given":"G.B.","family":"Lamont","sequence":"additional","affiliation":[]},{"given":"G.H.","family":"Gunsch","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Statistical Qualtig Assurance Methods for Engineers","year":"1999","author":"vardeman","key":"15"},{"key":"13","article-title":"Evolving finite-state machine strategies for protecting resources","author":"spears","year":"2000","journal-title":"Proceedings of the Int'l Symposium on Methodologies for Intelligent Systems"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/272991.272995"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1117\/12.304792"},{"journal-title":"Artificial Intelligence Through Simulated Intelligence","year":"1966","author":"fogel","key":"12"},{"journal-title":"A New Approach to Intrusion Detection","year":"2001","author":"dasgupta","key":"3"},{"key":"2","article-title":"Immunity-based intrusion detection systems: A general framework","author":"dasgupta","year":"1999","journal-title":"Proceedings of the 22nd National Information Systems Security Conference (NISSC)"},{"year":"2001","key":"1"},{"journal-title":"Writing Snort rules How to write Snort rules and keep your sanity","year":"2001","author":"roesch","key":"10"},{"key":"7","article-title":"A distributed agent based architecture for computer security applications","author":"harmer","year":"2001","journal-title":"IEEE Transactions on Evolutionary Computation Special Issue on Artificial Immune Systems"},{"key":"6","article-title":"The artificial immune model for network intrusion detection","author":"kim","year":"1999","journal-title":"7th European Conference on Intelligent Techniques and Soft Computing (EUFIT'99)"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1162\/106365600568257"},{"key":"4","article-title":"An intelligent decision support system for intrusion detection and response","author":"dasgupta","year":"2001","journal-title":"Lecture Notes in Computer Science Proceedings of the International Workshop on Mathematical Methods Models and Architectures for Computer Networks Security (MMM-ACNS)"},{"key":"9","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1007\/3-540-45474-8_8","article-title":"CDIS: Towards a Computer Immune System for Detecting Network Intrusions","author":"williams","year":"2001","journal-title":"Proceedings of the 4th International Symposium Recent Advances in Intrusion Detection"},{"journal-title":"Warthog Towards A Computer Immune System for Detecting \"Low and Slow\" Information System Attacks","year":"2001","author":"williams","key":"8"}],"event":{"name":"2002 World Congress on Computational Intelligence - WCCI'02","acronym":"CEC-02","location":"Honolulu, HI, USA"},"container-title":["Proceedings of the 2002 Congress on Evolutionary Computation. CEC'02 (Cat. No.02TH8600)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/7875\/21687\/01004484.pdf?arnumber=1004484","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,15]],"date-time":"2017-06-15T22:39:47Z","timestamp":1497566387000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1004484\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/cec.2002.1004484","relation":{},"subject":[]}}