{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,20]],"date-time":"2025-11-20T18:23:06Z","timestamp":1763662986227,"version":"3.28.0"},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,6]]},"DOI":"10.1109\/cec.2012.6256518","type":"proceedings-article","created":{"date-parts":[[2012,8,6]],"date-time":"2012-08-06T20:51:10Z","timestamp":1344286270000},"page":"1-7","source":"Crossref","is-referenced-by-count":11,"title":["An artificial immune system for phishing detection"],"prefix":"10.1109","author":[{"family":"Xing Fang","sequence":"first","affiliation":[]},{"given":"Nicholas","family":"Koceja","sequence":"additional","affiliation":[]},{"given":"Justin","family":"Zhan","sequence":"additional","affiliation":[]},{"given":"Gerry","family":"Dozier","sequence":"additional","affiliation":[]},{"given":"Dasgupta","family":"Dipankar","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Ending Spam Bayesian Content Filtering and the Art of Statistical Language Classification","year":"2005","author":"zdziarski","key":"19"},{"journal-title":"The American Heritage Dictionary of the English Language","year":"2006","key":"17"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.25"},{"journal-title":"National Information Security Glossary","year":"0","key":"15"},{"key":"16","article-title":"Artificial Immune-based Optimization Technique for Solving Economic Dispatch in Power System","volume":"3931","author":"rahman","year":"2005","journal-title":"LNCS"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2005.09.007"},{"journal-title":"Immune system","year":"2005","author":"parham","key":"14"},{"key":"11","first-page":"130","article-title":"A Biologically Inspired Immune System for Computers","author":"kephart","year":"1994","journal-title":"Proceedings of an International Workshop on the Synthesis and Simulation of Living Systems"},{"year":"0","key":"12"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2002.1011541"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/CICYBS.2011.5949409"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/CICYBS.2009.4925088"},{"key":"1","article-title":"On Diversity and Artificial Immune Systems: Incoporating a Diversity Operator into aiNet","volume":"3931","author":"andrews","year":"2005","journal-title":"LNCS"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/WAC.2002.1049551"},{"key":"7","first-page":"1289","article-title":"Immunity by Design: An Artificial Immune System","volume":"2","author":"hofmeyr","year":"1999","journal-title":"Proceedings of the Genetic and Evolutionary Computation Conference"},{"journal-title":"A Plan for Spam","year":"0","author":"graham","key":"6"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/RISP.1994.296580"},{"journal-title":"Enron Dataset","year":"0","key":"4"},{"key":"9","first-page":"952","article-title":"Immunity-based Intrusion Detection System Design, Vulerability Analysis, and GENERTIA's Genetic Arms Race","author":"hou","year":"0","journal-title":"The ACM Symposium on Applied Computing Santa Fe NM USA March 13-17 2005"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1162\/106365600568257"}],"event":{"name":"2012 IEEE Congress on Evolutionary Computation (CEC)","start":{"date-parts":[[2012,6,10]]},"location":"Brisbane, Australia","end":{"date-parts":[[2012,6,15]]}},"container-title":["2012 IEEE Congress on Evolutionary Computation"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6241678\/6252855\/06256518.pdf?arnumber=6256518","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T20:13:34Z","timestamp":1490127214000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6256518\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,6]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/cec.2012.6256518","relation":{},"subject":[],"published":{"date-parts":[[2012,6]]}}}