{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,20]],"date-time":"2026-01-20T12:58:55Z","timestamp":1768913935318,"version":"3.49.0"},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,4]]},"DOI":"10.1109\/cybersec.2014.6913971","type":"proceedings-article","created":{"date-parts":[[2014,10,8]],"date-time":"2014-10-08T21:01:08Z","timestamp":1412802068000},"page":"52-57","source":"Crossref","is-referenced-by-count":20,"title":["A cognitive approach for botnet detection using Artificial Immune System in the cloud"],"prefix":"10.1109","author":[{"given":"Victor R.","family":"Kebande","sequence":"first","affiliation":[]},{"given":"Hein. S.","family":"Venter","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2011.6123125"},{"key":"18","first-page":"99","article-title":"Anomaly detection using negative selection based on the r-contiguous matching rule","author":"singh","year":"2002","journal-title":"Proceedings of the 1st International Conference on Artificial Immune Systems"},{"key":"15","author":"european network and information security agency (enisa)","year":"0","journal-title":"2011 Botnet Detection Measurement Disinfection & Defence"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2008.925623"},{"key":"13","first-page":"45","article-title":"Architecture for an artificial immune system","volume":"7","author":"hofmeyr","year":"1999","journal-title":"Evolutionary Computation"},{"key":"14","first-page":"89","article-title":"How to generate detectors","volume":"1","author":"ayara","year":"2002","journal-title":"Proceedings of the 1st International Conference on Artificial Immune Systems (ICARIS)"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/ccnc08.2007.112"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-6940-7_7"},{"key":"3","first-page":"7","article-title":"The NIST definition of cloud computing","volume":"800","author":"mell","year":"2011","journal-title":"NIST Special Publication"},{"key":"2","author":"de castro","year":"1999","journal-title":"Artificial Immune Systems Part I-Basic Theory and Applications"},{"key":"1","year":"2012","journal-title":"Botnets \"The Dark Side of Cloud Computing"},{"key":"10","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1109\/LCN.2006.322100","article-title":"Detecting botnets with tight command and control","author":"strayer","year":"2006","journal-title":"Local Computer Networks Proceedings 2006 31st IEEE Conference on"},{"key":"7","author":"boxma","year":"0","journal-title":"Poisson Processes Ordinary and Compound"},{"key":"6","author":"bowers","year":"2008","journal-title":"A Quick Way to See That the Poisson Distribution is the Appropriate Mathematical Formulation for A Counting Process with Constant Rate and Intensity"},{"key":"5","author":"banday","year":"2009","journal-title":"Study of Botnets and Their Threats to Internet Security"},{"key":"4","first-page":"211","article-title":"Proactive botnet countermeasures: An offensive approach","volume":"3","author":"leder","year":"2009","journal-title":"The Virtual Battlefield Perspectives on Cyber Warfare"},{"key":"9","first-page":"43","article-title":"An algorithm for anomalybased botnet detection","author":"binkley","year":"2006","journal-title":"Proceedings of USENIX Steps to Reducing Unwanted Traffic on the Internet Workshop (SRUTI)"},{"key":"8","first-page":"321","article-title":"BotGraph: Large scale spamming botnet detection","volume":"9","author":"zhao","year":"2009","journal-title":"NSDI"}],"event":{"name":"2014 Third International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec)","location":"Beirut, Lebanon","start":{"date-parts":[[2014,4,29]]},"end":{"date-parts":[[2014,5,1]]}},"container-title":["2014 Third International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6908325\/6913961\/06913971.pdf?arnumber=6913971","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T22:04:18Z","timestamp":1498169058000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6913971\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,4]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/cybersec.2014.6913971","relation":{},"subject":[],"published":{"date-parts":[[2014,4]]}}}