{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T00:54:19Z","timestamp":1767920059169,"version":"3.49.0"},"reference-count":41,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,6]]},"DOI":"10.1109\/isorc.2013.6913240","type":"proceedings-article","created":{"date-parts":[[2014,10,8]],"date-time":"2014-10-08T16:48:11Z","timestamp":1412786891000},"page":"1-10","source":"Crossref","is-referenced-by-count":6,"title":["A framework for enhancing dependability in self-x systems by Artificial Immune Systems"],"prefix":"10.1109","author":[{"given":"Franz","family":"Rammig","sequence":"first","affiliation":[]},{"given":"Katharina","family":"Stahl","sequence":"additional","affiliation":[]},{"given":"Gavin","family":"Vaz","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","year":"2004","journal-title":"An architectural blueprint for autonomic computing"},{"key":"35","first-page":"230","article-title":"An immune-inspired approach to anomaly detection","author":"jamie twycross","year":"2007","journal-title":"Handbook of Research on Information Security and Assurance"},{"key":"17","article-title":"Dendritic cells for anomaly detection","author":"greensmith","year":"2010","journal-title":"Computing Research Repository"},{"key":"36","article-title":"Detecting anomalous process behaviour using second generation artificial immune systems","author":"twycross","year":"2010","journal-title":"International Journal of Unconventional Computing"},{"key":"18","doi-asserted-by":"crossref","DOI":"10.3233\/JCS-980109","article-title":"Intrusion detection using sequences of system calls","author":"hofmeyr","year":"1998","journal-title":"Journal of Computer Security"},{"key":"33","article-title":"Towards a generic observer\/controller architecture for organic computing","author":"richter","year":"2006","journal-title":"Christian Hochberger and R\ufffddiger Liskowsky Editors INFORMATIK 2006 Informatik F\ufffdr Menschen! LNI"},{"key":"15","author":"greensmith","year":"2007","journal-title":"The Dendritic Cell Algorithm"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1109\/12.192214"},{"key":"16","article-title":"Detecting danger: The dendritic cell algorithm","author":"greensmith","year":"2010","journal-title":"Computing Research Repository"},{"key":"39","article-title":"Runtime model checking for safety and consistency of self-optimizing mechatronic systems","author":"zhao","year":"2008","journal-title":"Proceedings of the 7th International Heinz Nixdorf Symposium Self-optimzing Mechatronic Systems ALB-HNIVerlagsschriftenreihe"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1996.502675"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/RISP.1994.296580"},{"key":"37","author":"williamson","year":"2002","journal-title":"Biologically Inspired Approaches to Computer Security"},{"key":"11","year":"0","journal-title":"ORCOS-Organic Reconfigurable Operating System"},{"key":"38","article-title":"A survey of anomaly intrusion detection techniques","author":"yu","year":"2012","journal-title":"J Comput Sci Coll"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2008.54"},{"key":"21","author":"iqbal","year":"0","journal-title":"World Academy of Science Engineering and Technology 3 2005 Danger Theory and Intelligent Data Processing"},{"key":"20","year":"0","journal-title":"DFG SPP 1183 Organic Computing Initiative"},{"key":"41","doi-asserted-by":"publisher","DOI":"10.1109\/ISORC.2012.28"},{"key":"40","doi-asserted-by":"publisher","DOI":"10.1016\/j.entcs.2009.09.035"},{"key":"22","author":"janeway","year":"2005","journal-title":"Immunobiology The Immune System in Health and Disease"},{"key":"23","doi-asserted-by":"crossref","DOI":"10.5120\/3399-4730","article-title":"Article: A review of anomaly based intrusion detection systems","author":"jyothsna","year":"2011","journal-title":"International Journal of Computer Applications"},{"key":"24","article-title":"Malicious code execution detection and response immune system inspired by the danger theory","author":"kim","year":"2005","journal-title":"Proceedings of the Adaptive and Resilient Computing Security Workshop (ARCS-05)"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1146\/annurev.iy.12.040194.005015"},{"key":"26","article-title":"Janeway's immunobiology (immunobiology: The immune system (janeway))","author":"murphy","year":"2007","journal-title":"Garland Science"},{"key":"27","author":"oberth\ufffdr","year":"2009","journal-title":"Towards An RTOS for Self-optimizing Mechatronic Systems"},{"key":"28","article-title":"Flexible resource management-a framework for self-optimizing real-time systems","author":"oberth\ufffdr","year":"2004","journal-title":"Proc 5th IFIP Working Conference on Distributed and Parallel Embedded Systems"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2002.1173261"},{"key":"3","article-title":"The clonal selection algorithm with engineering applications","author":"de castro","year":"2002","journal-title":"Workshops of the GECCO 2002"},{"key":"2","author":"axelsson","year":"2000","journal-title":"Intrusion Detection Systems A Survey and Taxonomy"},{"key":"10","doi-asserted-by":"crossref","DOI":"10.1109\/SECPRI.2003.1199328","article-title":"Anomaly detection using call stack information","author":"hanping feng","year":"2003","journal-title":"Proceedings of the 2003 IEEE Symposium on Security and Privacy IEEE Computer Society"},{"key":"1","article-title":"The danger theory and its application to artificial immune systems","author":"aickelin","year":"2008","journal-title":"CoRR"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1109\/EDCC.2010.33"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2010.08.024"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1201\/9781420065466"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2003.1176988"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2007.1034"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1109\/ISORCW.2011.19"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/1541880.1541882"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2003.1199328"},{"key":"8","author":"de castro","year":"2002","journal-title":"Artificial Immune Systems A New Computational Approach"}],"event":{"name":"2013 IEEE 16th International Symposium on Object\/Component\/Service-Oriented Real-Time Distributed Computing (ISORC)","location":"Paderborn, Germany","start":{"date-parts":[[2013,6,19]]},"end":{"date-parts":[[2013,6,21]]}},"container-title":["16th IEEE International Symposium on Object\/component\/service-oriented Real-time distributed Computing (ISORC 2013)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6906723\/6913188\/06913240.pdf?arnumber=6913240","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,15]],"date-time":"2019-08-15T20:43:39Z","timestamp":1565901819000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6913240\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,6]]},"references-count":41,"URL":"https:\/\/doi.org\/10.1109\/isorc.2013.6913240","relation":{},"subject":[],"published":{"date-parts":[[2013,6]]}}}