{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T00:19:06Z","timestamp":1730247546663,"version":"3.28.0"},"reference-count":9,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,5]]},"DOI":"10.1109\/icis.2017.7960066","type":"proceedings-article","created":{"date-parts":[[2017,6,29]],"date-time":"2017-06-29T17:18:28Z","timestamp":1498756708000},"page":"619-622","source":"Crossref","is-referenced-by-count":2,"title":["The application of immune clone algorithm in network intrusion detection"],"prefix":"10.1109","author":[{"given":"Xuekun","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Jing","family":"An","sequence":"additional","affiliation":[]},{"given":"Yongbin","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Wen","family":"Liu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","first-page":"110","article-title":"An Immunological approach to change detection: Algorithms, analysis and implications[C]","author":"haeseleer","year":"1996","journal-title":"Proc of the 1996 IEEE Computer Society Press"},{"key":"ref3","article-title":"Immune Memory in the dynamic clone selection algorithm[R]","author":"kim","year":"2002","journal-title":"Submit to the first international Conference on Artificial Immune System(ICARIS)"},{"key":"ref6","article-title":"Towards an artificial immune system for network intrusion detection","author":"kim","year":"0","journal-title":"An investigation of clone selection with a negative selection operator"},{"key":"ref5","article-title":"A Model of Gene Library Evolution in the Dynamic Clone Selection Algorithm","volume":"9","author":"kim","year":"2002","journal-title":"Proc the First International Conference on Artificial Immune Systems Canterbury"},{"key":"ref8","article-title":"An artificial immune system approach with secondary response for misbehavior detection in mobile ad-hoc networks[R]","author":"sarafijanovic","year":"2003","journal-title":"Technical Report IC\/2003\/65 Eco le Poly technique Federal de Lausanne"},{"key":"ref7","first-page":"1244","article-title":"The Artificial Immune System for Network Intrusion Detection: An Investigation of Clone Selection with a Negative Selection Operator[C]","author":"kim","year":"2001","journal-title":"P Congress on Evolutionary Computation"},{"key":"ref2","first-page":"1244","article-title":"Towards an artificial immune system for network intrusion detection: an investigation of colonel selection with a negative selection operator[C]","volume":"2","author":"jung","year":"2001","journal-title":"Proceedings of the 2001Congress on Evolutionary Computation"},{"key":"ref9","article-title":"Biologically Inspired Approaches to Computer Security[C]","author":"matthew williamson","year":"2002","journal-title":"Technical Report HPL"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45192-1_15"}],"event":{"name":"2017 IEEE\/ACIS 16th International Conference on Computer and Information Science (ICIS)","start":{"date-parts":[[2017,5,24]]},"location":"Wuhan, China","end":{"date-parts":[[2017,5,26]]}},"container-title":["2017 IEEE\/ACIS 16th International Conference on Computer and Information Science (ICIS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7951674\/7959951\/07960066.pdf?arnumber=7960066","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,10,2]],"date-time":"2017-10-02T21:36:35Z","timestamp":1506980195000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7960066\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5]]},"references-count":9,"URL":"https:\/\/doi.org\/10.1109\/icis.2017.7960066","relation":{},"subject":[],"published":{"date-parts":[[2017,5]]}}}