{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T01:32:39Z","timestamp":1730251959120,"version":"3.28.0"},"reference-count":8,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,7]]},"DOI":"10.1109\/icnc.2011.6022387","type":"proceedings-article","created":{"date-parts":[[2011,10,12]],"date-time":"2011-10-12T16:25:13Z","timestamp":1318436713000},"page":"2295-2299","source":"Crossref","is-referenced-by-count":1,"title":["T-Cell detector maturation algorithm based on cooperative co-evolution GA"],"prefix":"10.1109","author":[{"given":"Jinyin","family":"Chen","sequence":"first","affiliation":[]},{"given":"Dongyong","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Zhilin","family":"Feng","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","first-page":"235","article-title":"Novel IDS model and the arithmetic to get the detection","volume":"35","author":"cheng","year":"2006","journal-title":"Dianzi Keji Daxue Xuebao\/Journal of the University of Electronic Science and Technology of China"},{"key":"2","first-page":"93","article-title":"Research on a novel intrusion detection system based on artificial immune theory","volume":"35","author":"huang","year":"2006","journal-title":"Journal of UEST of China"},{"key":"1","first-page":"62","article-title":"Network-based hybrid intrusion detection and honey systems as active reaction schemes","volume":"7","author":"garcia","year":"2007","journal-title":"IJCSNS International Journal of Computer Science and Network Security"},{"key":"7","first-page":"1330","article-title":"An evolutionary of negative selection in an artificial immune system for network intrusion detection [A]","author":"kim","year":"2001","journal-title":"Proc 2001 Genetic and Evolutionary Computation Conf"},{"key":"6","first-page":"122","article-title":"A novel negative selection algorithm with an array of partial matching lengths for each detector","author":"luo","year":"2006","journal-title":"Proceedings of the 9th International Conference on Parallel Problem Solving from Nature (PPSN-IX)"},{"key":"5","first-page":"316","article-title":"Immune system approaches to intrusion detection - A review[C]","author":"kim","year":"2004","journal-title":"ICARIS-2004 3rd International Conference on Artificial Immune Systems"},{"doi-asserted-by":"publisher","key":"4","DOI":"10.1109\/RISP.1994.296580"},{"key":"8","first-page":"907","article-title":"Research on adaptively generating detector algorithm","volume":"31","author":"luo","year":"2005","journal-title":"Zidonghua Xuebao\/Acta Automatica Sinica"}],"event":{"name":"2011 Seventh International Conference on Natural Computation (ICNC 2011)","start":{"date-parts":[[2011,7,26]]},"location":"Shanghai","end":{"date-parts":[[2011,7,28]]}},"container-title":["2011 Seventh International Conference on Natural Computation"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6012803\/6022384\/06022387.pdf?arnumber=6022387","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T01:02:43Z","timestamp":1490058163000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6022387\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,7]]},"references-count":8,"URL":"https:\/\/doi.org\/10.1109\/icnc.2011.6022387","relation":{},"subject":[],"published":{"date-parts":[[2011,7]]}}}