{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,11,19]],"date-time":"2024-11-19T16:32:49Z","timestamp":1732033969253,"version":"3.28.0"},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,6]]},"DOI":"10.1109\/fuzzy.2011.6007564","type":"proceedings-article","created":{"date-parts":[[2011,9,12]],"date-time":"2011-09-12T20:27:07Z","timestamp":1315859227000},"page":"115-122","source":"Crossref","is-referenced-by-count":3,"title":["Intrusion detection systems adapted from agent-based artificial immune systems"],"prefix":"10.1109","author":[{"family":"Chung-Ming Ou","sequence":"first","affiliation":[]},{"family":"Yao-Tien Wang","sequence":"additional","affiliation":[]},{"given":"C. R.","family":"Ou","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"13","DOI":"10.1016\/j.inffus.2009.04.006"},{"doi-asserted-by":"publisher","key":"14","DOI":"10.1109\/TEVC.2002.1011540"},{"doi-asserted-by":"publisher","key":"11","DOI":"10.1016\/j.comcom.2007.03.008"},{"year":"2002","author":"kim","journal-title":"Integrating artificial immune algorithms for intrusion detection","key":"12"},{"key":"3","first-page":"144","article-title":"Danger theory: The link between ais and ids","volume":"2787","author":"aickelin","year":"2003","journal-title":"Lecture Notes in Computer Sciences"},{"key":"2","article-title":"An agent-based classification model","author":"gu","year":"2007","journal-title":"9th European Agent Systems Summer School (EASSS2007)"},{"doi-asserted-by":"publisher","key":"1","DOI":"10.1109\/SECPRI.1996.502675"},{"doi-asserted-by":"publisher","key":"10","DOI":"10.1109\/CISW.2007.4425560"},{"doi-asserted-by":"publisher","key":"7","DOI":"10.1146\/annurev.iy.12.040194.005015"},{"doi-asserted-by":"publisher","key":"6","DOI":"10.1007\/978-1-84800-261-6_5"},{"year":"1978","author":"kim","journal-title":"An Artificial Immune System Architecture for Computer Security Applications","key":"5"},{"key":"4","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1007\/s12065-008-0008-6","article-title":"The dca: Some comparison","volume":"1","author":"greensmith","year":"2008","journal-title":"Evolutionary Intelligence"},{"doi-asserted-by":"publisher","key":"9","DOI":"10.1109\/WKDD.2009.187"},{"key":"8","doi-asserted-by":"crossref","first-page":"234","DOI":"10.1109\/ICICIC.2006.42","article-title":"An artificial immune system model for multi agents based resource discovery in distributed environments","author":"yeom","year":"2006","journal-title":"Proceedings of the First international Conference on innovative Computing information and Control"}],"event":{"name":"2011 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE 2011)","start":{"date-parts":[[2011,6,27]]},"location":"Taipei","end":{"date-parts":[[2011,6,30]]}},"container-title":["2011 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE 2011)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5976945\/6007305\/06007564.pdf?arnumber=6007564","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,12,6]],"date-time":"2019-12-06T07:28:43Z","timestamp":1575617323000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6007564\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,6]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/fuzzy.2011.6007564","relation":{},"subject":[],"published":{"date-parts":[[2011,6]]}}}