{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T12:28:19Z","timestamp":1730204899332,"version":"3.28.0"},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007,9]]},"DOI":"10.1109\/cec.2007.4424932","type":"proceedings-article","created":{"date-parts":[[2008,1,16]],"date-time":"2008-01-16T04:09:25Z","timestamp":1200456565000},"page":"3547-3553","source":"Crossref","is-referenced-by-count":5,"title":["Intrusion detection using a hybridization of evolutionary fuzzy systems and artificial immune systems"],"prefix":"10.1109","author":[{"given":"M.","family":"Saniee Abadeh","sequence":"first","affiliation":[]},{"given":"J.","family":"Habibi","sequence":"additional","affiliation":[]},{"given":"M.","family":"Daneshi","sequence":"additional","affiliation":[]},{"given":"M.","family":"Jalali","sequence":"additional","affiliation":[]},{"given":"M.","family":"Khezrzadeh","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1006\/jnca.1996.0014"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1016\/0165-0114(92)90032-Y"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/41.807986"},{"journal-title":"KDD-cup data set","year":"0","key":"15"},{"year":"0","key":"16"},{"key":"13","article-title":"an unsupervised anomaly intrusion detection algorithm based on swarm intelligence","author":"feng","year":"2005","journal-title":"Proc Fourth Int Conf Mach Learning Cybern"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/IAW.2005.1495997"},{"year":"0","key":"11"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/948143.948144"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1006\/jtbi.1993.1139"},{"year":"0","key":"20"},{"key":"22","article-title":"immunological memory is associative","author":"smith","year":"1998","journal-title":"Artificial Immune Systems and Their Applications"},{"key":"23","first-page":"373","article-title":"towards a network theory of the immune system","volume":"125 c","author":"jerne","year":"1974","journal-title":"Annals of Immunology"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1016\/S0303-2647(99)00092-1"},{"year":"0","key":"25"},{"article-title":"intrusion detection systems: a survey and taxonomy","year":"2000","author":"axelsson","key":"3"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2004.837705"},{"key":"10","article-title":"intrusion detection using a fuzzy genetics-based learning algorithm","volume":"414 428","author":"saniee abadeh","year":"2007","journal-title":"Journal of Network and Computer Applications"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2004.09.008"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2004.01.006"},{"key":"6","first-page":"256","article-title":"intrusion detection combining multiple decision trees by fuzzy logic","author":"tian","year":"2005","journal-title":"Sixth International Conference on Parallel and Distributed Computing"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2002.801356"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/INDCON.2005.1590122"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2005.06.002"},{"key":"8","article-title":"ant colony optimization based network intrusion feature selection and detection","author":"gao","year":"2005","journal-title":"Proc Fourth Int Conf Mach Learning Cybern"}],"event":{"name":"2007 IEEE Congress on Evolutionary Computation","start":{"date-parts":[[2007,9,25]]},"location":"Singapore","end":{"date-parts":[[2007,9,28]]}},"container-title":["2007 IEEE Congress on Evolutionary Computation"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4424445\/4424446\/04424932.pdf?arnumber=4424932","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,27]],"date-time":"2020-04-27T21:22:15Z","timestamp":1588022535000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/4424932\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,9]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/cec.2007.4424932","relation":{},"subject":[],"published":{"date-parts":[[2007,9]]}}}