{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T14:34:37Z","timestamp":1730298877566,"version":"3.28.0"},"reference-count":44,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.1109\/ssci44817.2019.9002965","type":"proceedings-article","created":{"date-parts":[[2020,2,21]],"date-time":"2020-02-21T07:49:24Z","timestamp":1582271364000},"page":"1915-1921","source":"Crossref","is-referenced-by-count":0,"title":["Vulnerability Detection in Firmware Based on Clonal Selection Algorithm"],"prefix":"10.1109","author":[{"given":"Man","family":"Yu","sequence":"first","affiliation":[]},{"given":"Dongdong","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Dian","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Linjun","family":"Ran","sequence":"additional","affiliation":[]},{"given":"Jianwen","family":"Xiang","sequence":"additional","affiliation":[]},{"given":"Zhongjin","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Yanzhen","family":"Xing","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TETCI.2018.2829907"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-011-4451-0"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ICIS.2017.7960066"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/0167-2789(86)90240-X"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/s11219-018-9435-5"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-93411-2_6"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/11539117_112"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2015.2507133"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1136\/jamia.2000.0070028"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2844854"},{"year":"0","key":"ref10","article-title":"IDAPro"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2900714"},{"key":"ref11","first-page":"36","article-title":"The clonal selection algorithm with engineering applications","author":"de castro","year":"2000","journal-title":"Proceedings of GECCO"},{"key":"ref12","article-title":"A clonal selection algorithm for dynamic multimodal function optimization","author":"luo","year":"2018","journal-title":"Swarm and Evolutionary Computation"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/SSCI.2017.8285340"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2430553.2430558"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.49"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2980983.2908126"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2544173.2509509"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2018.00052"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2013.83"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23185"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2897845.2897900"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978370"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134018"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICSMC.1998.726682"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2893733"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-99277-8_17"},{"key":"ref8","first-page":"2288","article-title":"VDNS: An algorithm for cross-platform vulnerability searching in binary firmware","volume":"53","author":"chang","year":"2016","journal-title":"Journal of Computer Research & Development"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/B978-1-55860-247-2.50037-1"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3029806.3029826"},{"year":"0","key":"ref9","article-title":"Binwalk"},{"journal-title":"The Hunt for IoT Multi-Purpose Attack Thingbots Threaten Internet Stability and Human Life","year":"2018","author":"boddy","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/DSA.2017.16"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2666356.2594343"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2012.70"},{"key":"ref42","first-page":"1402.1242","article-title":"An improved AIS based e-mail classification technique for spam detection","author":"idris","year":"2014"},{"key":"ref24","first-page":"161","article-title":"Structural comparison of executable objects","volume":"46","author":"flake","year":"2004","journal-title":"Proc Int GI Workshop Detection Intrusions Malware Vulnerability Assessment"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1186\/s13635-017-0059-2"},{"key":"ref23","first-page":"1","article-title":"Graphs, entropy and grid computing: Automatic comparison of malware","author":"briones","year":"2008","journal-title":"Virus Bulletin Conference"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/ICESC.2014.73"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/CMPSAC.2004.1342667"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2012.03.021"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/2513228.2513300"}],"event":{"name":"2019 IEEE Symposium Series on Computational Intelligence (SSCI)","start":{"date-parts":[[2019,12,6]]},"location":"Xiamen, China","end":{"date-parts":[[2019,12,9]]}},"container-title":["2019 IEEE Symposium Series on Computational Intelligence (SSCI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8975711\/9002648\/09002965.pdf?arnumber=9002965","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,17]],"date-time":"2022-07-17T21:51:16Z","timestamp":1658094676000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9002965\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12]]},"references-count":44,"URL":"https:\/\/doi.org\/10.1109\/ssci44817.2019.9002965","relation":{},"subject":[],"published":{"date-parts":[[2019,12]]}}}