{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T18:36:38Z","timestamp":1729622198193,"version":"3.28.0"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,7]]},"DOI":"10.1109\/icnc.2013.6818055","type":"proceedings-article","created":{"date-parts":[[2014,5,30]],"date-time":"2014-05-30T14:25:40Z","timestamp":1401459940000},"page":"644-648","source":"Crossref","is-referenced-by-count":2,"title":["Artificial immunity-based anomaly detection of network user behavior"],"prefix":"10.1109","author":[{"given":"Yan","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Caiming","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Hongying","family":"Qin","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"15","doi-asserted-by":"publisher","DOI":"10.5121\/ijaia.2012.3107"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-007-2911-7_55"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32615-8_1"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.4304\/jnw.8.3.636-644"},{"key":"11","first-page":"1289","article-title":"Immunity by design: An artificial immune system","author":"hofmeyr","year":"1999","journal-title":"Proceedings of Genetic Evolutionary Computation Conf"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1162\/106365600568257"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2011.01.001"},{"volume":"2003","journal-title":"American Computer Security Institute","year":"2003","key":"2"},{"journal-title":"Symantec 2013 Internet Security Threat Report","year":"2013","key":"1"},{"key":"10","first-page":"35","article-title":"Research and design of a network behavior analysis &monitoring system","volume":"32","author":"wang","year":"2012","journal-title":"Journal of Hangzhou Dianzi University"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2011.14"},{"key":"6","doi-asserted-by":"crossref","first-page":"668","DOI":"10.1016\/j.amc.2008.01.038","article-title":"Analysis of the user behavior and opinion classification based on the BBS","volume":"205","author":"huang","year":"2008","journal-title":"Applied Mathematics and Computation"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1016\/j.istr.2010.10.011"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1016\/j.autcon.2012.04.001"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2010.05.002"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-010-9384-1"}],"event":{"name":"2013 9th International Conference on Natural Computation (ICNC)","start":{"date-parts":[[2013,7,23]]},"location":"Shenyang, China","end":{"date-parts":[[2013,7,25]]}},"container-title":["2013 Ninth International Conference on Natural Computation (ICNC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6811386\/6817930\/06818055.pdf?arnumber=6818055","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T10:07:08Z","timestamp":1498126028000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6818055\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,7]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/icnc.2013.6818055","relation":{},"subject":[],"published":{"date-parts":[[2013,7]]}}}