{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T13:31:42Z","timestamp":1760707902362},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007,9]]},"DOI":"10.1109\/cec.2007.4424910","type":"proceedings-article","created":{"date-parts":[[2008,1,16]],"date-time":"2008-01-16T09:09:25Z","timestamp":1200474565000},"page":"3392-3398","source":"Crossref","is-referenced-by-count":15,"title":["An artificial immunity-based spam detection system"],"prefix":"10.1109","author":[{"given":"B.","family":"Sirisanyalak","sequence":"first","affiliation":[]},{"given":"O.","family":"Sornil","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1007\/978-3-662-06369-9_4","article-title":"an overview of artificial immune systems","author":"timmis","year":"2004","journal-title":"Natural Computation Series"},{"journal-title":"SpamAssasin Public Corpus","year":"2005","author":"spamassasin","key":"17"},{"year":"0","key":"18"},{"journal-title":"Common Spammer Trick White Paper","year":"2005","key":"15"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1016\/0306-4573(88)90021-0"},{"key":"13","first-page":"231","article-title":"developing an immunity to spam","author":"oda","year":"2003","journal-title":"Genetic and Evolutionary Computation Conference (GECCO"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2003.1299602"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1023\/B:GENP.0000036019.81454.41"},{"key":"12","first-page":"175","article-title":"a model of gene library evolution in the dynamic clonal selection algorithm","author":"kim","year":"2002","journal-title":"International Conference on Artificial Immune Systems"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/ICSMC.1997.625778"},{"journal-title":"Major Techniques for Classifying Spam","year":"2003","author":"trudeau","key":"20"},{"year":"0","key":"2"},{"year":"0","key":"1"},{"key":"10","first-page":"1015","article-title":"towards an artificial immune system for network intrusion detection: an investigation of dynamic clonal selection","author":"kim","year":"2002","journal-title":"Congress on Evolutionary Computation"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/RISP.1994.296580"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/262793.262811"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2002.1011541"},{"key":"4","first-page":"40","article-title":"immunity-based intrusion detection systems: a general framework","author":"dasgupta","year":"1999","journal-title":"22nd National Information Systems Security Conference"},{"key":"9","first-page":"1330","article-title":"an evaluation of negative selection in an artificial immune system for network intrusion detection","author":"kim","year":"2001","journal-title":"Genetic and Evolutionary Computation Conference (GECCO-2001)"},{"journal-title":"The Spammers' Compendium","year":"2005","author":"graham-cumming","key":"8"}],"event":{"name":"2007 IEEE Congress on Evolutionary Computation","start":{"date-parts":[[2007,9,25]]},"location":"Singapore","end":{"date-parts":[[2007,9,28]]}},"container-title":["2007 IEEE Congress on Evolutionary Computation"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4424445\/4424446\/04424910.pdf?arnumber=4424910","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,28]],"date-time":"2020-04-28T01:22:13Z","timestamp":1588036933000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/4424910\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,9]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/cec.2007.4424910","relation":{},"subject":[],"published":{"date-parts":[[2007,9]]}}}