{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T15:36:02Z","timestamp":1772724962678,"version":"3.50.1"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,8]]},"DOI":"10.1109\/icccn.2016.7568495","type":"proceedings-article","created":{"date-parts":[[2016,9,15]],"date-time":"2016-09-15T16:53:48Z","timestamp":1473958428000},"page":"1-6","source":"Crossref","is-referenced-by-count":51,"title":["Behavioral Modeling Intrusion Detection System (BMIDS) Using Internet of Things (IoT) Behavior-Based Anomaly Detection via Immunity-Inspired Algorithms"],"prefix":"10.1109","author":[{"given":"Briana","family":"Arrington","sequence":"first","affiliation":[]},{"given":"LiEsa","family":"Barnett","sequence":"additional","affiliation":[]},{"given":"Rahmira","family":"Rufus","sequence":"additional","affiliation":[]},{"given":"Albert","family":"Esterline","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1162\/106365600568257"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1002\/9780470512517"},{"key":"ref12","article-title":"Towards an artificial immune system for network intrusion detection: an investigation of clonal selection with a negative selection operator","author":"kim","year":"2001","journal-title":"Evolutionary Computation"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICACTE.2010.5579543"},{"key":"ref14","article-title":"An Autonomic Computing System based on a Rule-based Policy Engine and Artificial Immune Systems","author":"rufus","year":"2016","journal-title":"Proceeding of the 27th Modern Artificial Intelligence and Cognitive Science Conference (MAICS)"},{"key":"ref15","article-title":"The Online Home of Artificial Immune Systems","year":"2013"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1037\/0003-066X.36.7.715"},{"key":"ref3","article-title":"The Internet of things is getting its own wireless networks","author":"brustein","year":"2014"},{"key":"ref6","article-title":"Overview of the Internet of things","year":"2012","journal-title":"Itu int"},{"key":"ref5","article-title":"The ecological approach to visual perception","author":"gibson","year":"1979"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICCPEIC.2015.7259486"},{"key":"ref7","article-title":"GreenPeak","year":"2016"},{"key":"ref2","article-title":"Towards an Internet of Things smart home to perform behavior-based intrusion detection via a Artificial Immune System","author":"rufus","year":"0"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICMTMA.2014.57"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/WSC.2009.5429324"}],"event":{"name":"2016 25th International Conference on Computer Communication and Networks (ICCCN)","location":"Waikoloa, HI, USA","start":{"date-parts":[[2016,8,1]]},"end":{"date-parts":[[2016,8,4]]}},"container-title":["2016 25th International Conference on Computer Communication and Networks (ICCCN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7566809\/7568456\/07568495.pdf?arnumber=7568495","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2016,10,5]],"date-time":"2016-10-05T07:52:56Z","timestamp":1475653976000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7568495\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,8]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/icccn.2016.7568495","relation":{},"subject":[],"published":{"date-parts":[[2016,8]]}}}