{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T01:33:39Z","timestamp":1730252019273,"version":"3.28.0"},"reference-count":22,"publisher":"IEEE","license":[{"start":{"date-parts":[[2012,5,1]],"date-time":"2012-05-01T00:00:00Z","timestamp":1335830400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2012,5,1]],"date-time":"2012-05-01T00:00:00Z","timestamp":1335830400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,5]]},"DOI":"10.1109\/icnc.2012.6234533","type":"proceedings-article","created":{"date-parts":[[2012,7,19]],"date-time":"2012-07-19T23:43:57Z","timestamp":1342741437000},"page":"874-878","source":"Crossref","is-referenced-by-count":26,"title":["Research on Dynamical Security Risk Assessment for the Internet of Things inspired by immunology"],"prefix":"10.1109","author":[{"given":"Caiming","family":"Liu","sequence":"first","affiliation":[{"name":"School of Information Science &amp; Technology, Southwest Jiaotong University, Chengdu, China"}]},{"given":"Yan","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Computer Science, Leshan Normal University, China"}]},{"given":"Jinquan","family":"Zeng","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, China"}]},{"given":"Lingxi","family":"Peng","sequence":"additional","affiliation":[{"name":"School of Computer and Education Software Guangzhou University, China"}]},{"given":"Run","family":"Chen","sequence":"additional","affiliation":[{"name":"School of Computer Science, Sichuan University, Chengdu, China"}]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2002.1011541"},{"key":"22","first-page":"945","article-title":"A real-time method of risk evaluation based on artificial immune system for network security","volume":"33","author":"wang","year":"2005","journal-title":"Acta Electronica Sinica"},{"key":"17","first-page":"1281","article-title":"Artificial immune system: Principle, models, analysis and perspectives","volume":"25","author":"xiao","year":"2002","journal-title":"Chinese Journal of Computers"},{"key":"18","first-page":"1015","article-title":"Towards an artificial immune system for network intrusion detection: An investigation of dynamic clonal selection","author":"kim","year":"0","journal-title":"Proc 2002 Congress Evolutionary Computation"},{"journal-title":"Computer immunology","year":"2004","author":"li","key":"15"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-60566-310-4"},{"key":"13","article-title":"Internet of things: Emerging and future scenarios from an information security perspective","author":"dlamini","year":"0","journal-title":"Proc of Southern Africa Telecommunication Networks and Applications Conference August 2009"},{"key":"14","first-page":"1540","article-title":"Development and Prospect of the Artificial I mmune System","volume":"31","author":"jiao","year":"2003","journal-title":"Acta Electronica Sinica"},{"key":"11","first-page":"89","article-title":"Deckard: A system to detect change of RFID tag ownership","volume":"7","author":"mirowski","year":"2007","journal-title":"International Journal of Computer Science and Network Security"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS.2007.31"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1360\/04yf0140"},{"key":"3","first-page":"28","article-title":"Security model and key technology on Internet of Things","author":"liu","year":"2010","journal-title":"Digital Communication"},{"journal-title":"An immunological model of distributed detection and its application to computer security","year":"1999","author":"hofmeyr","key":"20"},{"key":"2","first-page":"10","article-title":"Survey of information security risk assessment","volume":"25","author":"feng","year":"2004","journal-title":"Journal of China Institute of Communications"},{"journal-title":"ITU Internet Reports 2005 The Internet of Things","year":"2005","key":"1"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-009-9210-z"},{"key":"7","article-title":"A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks","volume":"4","author":"padmavathi","year":"2009","journal-title":"International Journal of Information and Computer Security"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2005.861395"},{"journal-title":"Guidelines for securing radio frequency identification (RFID) systems Recommendations of the National Institute of Standards and Technology","year":"2007","author":"karygiannis","key":"5"},{"key":"4","first-page":"336","article-title":"Internet of things and privacy preserving technologies","author":"oleshchuk","year":"0","journal-title":"Proc of 1st International Conference on Wireless Communication Vehicular Technology Information Theory and Aerospace & Electronic Systems Technology Aalborg Denmark 2009"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/CHINACOM.2006.344722"},{"key":"8","first-page":"31","article-title":"Security Vulnerabilities in Wireless Sensor Networks: A Survey","author":"kavitha","year":"2010","journal-title":"Journal of Information Assurance and Security"}],"event":{"name":"2012 8th International Conference on Natural Computation (ICNC)","start":{"date-parts":[[2012,5,29]]},"location":"Chongqing, China","end":{"date-parts":[[2012,5,31]]}},"container-title":["2012 8th International Conference on Natural Computation"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6227653\/6234502\/06234533.pdf?arnumber=6234533","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,25]],"date-time":"2024-03-25T19:09:23Z","timestamp":1711393763000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6234533\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,5]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/icnc.2012.6234533","relation":{},"subject":[],"published":{"date-parts":[[2012,5]]}}}