{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:40:05Z","timestamp":1750308005065,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2006,7,8]],"date-time":"2006-07-08T00:00:00Z","timestamp":1152316800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2006,7,8]]},"DOI":"10.1145\/1143997.1144016","type":"proceedings-article","created":{"date-parts":[[2006,7,24]],"date-time":"2006-07-24T16:53:01Z","timestamp":1153759981000},"page":"103-110","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":20,"title":["A retrovirus inspired algorithm for virus detection &amp; optimization"],"prefix":"10.1145","author":[{"given":"Kenneth S.","family":"Edge","sequence":"first","affiliation":[{"name":"Air Force Institute of Technology, Wright-Patterson AFB, Dayton, OH"}]},{"given":"Gary B.","family":"Lamont","sequence":"additional","affiliation":[{"name":"Air Force Institute of Technology, Wright-Patterson AFB, Dayton, OH"}]},{"given":"Richard A.","family":"Raines","sequence":"additional","affiliation":[{"name":"Air Force Institute of Technology, Wright-Patterson AFB, Dayton, OH"}]}],"member":"320","published-online":{"date-parts":[[2006,7,8]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5555\/229867"},{"key":"e_1_3_2_1_2_1","unstructured":"Cert Coordination Center Website www.cert.org as of 16 Aug 2005.  Cert Coordination Center Website www.cert.org as of 16 Aug 2005."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2002.1011541"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/552363"},{"key":"e_1_3_2_1_5_1","volume-title":"Artificial Immune Systems: A New Computational Intelligence Approach","author":"de Castro L.","year":"2002","unstructured":"L. de Castro and J. Timmis . Artificial Immune Systems: A New Computational Intelligence Approach , Springer-Verlag . 2002 L. de Castro and J. Timmis. Artificial Immune Systems: A New Computational Intelligence Approach, Springer-Verlag. 2002"},{"key":"e_1_3_2_1_6_1","volume-title":"Fogel, & Michalewicz (eds.)","author":"Eshelman L.","year":"2000","unstructured":"L. Eshelman , Genetic Algorithms. Evolutionary Computation 1: Basic Algorithms and Operators. B\u00e4ck , Fogel, & Michalewicz (eds.) Bristol, Institute of Physics , 2000 L. Eshelman, Genetic Algorithms. Evolutionary Computation 1: Basic Algorithms and Operators. B\u00e4ck, Fogel, & Michalewicz (eds.) Bristol, Institute of Physics, 2000"},{"key":"e_1_3_2_1_7_1","first-page":"361","volume-title":"Immunology as Information Processing. Design Principles for Immune System & Other Distributed Autonomous Systems","author":"Forrest S.","year":"2000","unstructured":"S. Forrest and S. Hofmeyr , Immunology as Information Processing. Design Principles for Immune System & Other Distributed Autonomous Systems . Segel and Cohen, eds. Oxford University Press , 2000 . pp 361 -- 387 . S. Forrest and S. Hofmeyr, Immunology as Information Processing. Design Principles for Immune System & Other Distributed Autonomous Systems. Segel and Cohen, eds. Oxford University Press, 2000. pp 361--387."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1162\/1063656054088512"},{"key":"e_1_3_2_1_9_1","first-page":"526","volume-title":"Proceedings of the 19th National Information Systems Security Conference (NISSC'96)","author":"Gordon S.","year":"1996","unstructured":"S. Gordon and R. Ford . Real world anti-virus product reviews and evaluations - the current state of affairs . In Proceedings of the 19th National Information Systems Security Conference (NISSC'96) , pages 526 -- 538 , Baltimore, MD, USA , Oct. 1996 . National Institute of Standards and Technology (NIST). S. Gordon and R. Ford. Real world anti-virus product reviews and evaluations - the current state of affairs. In Proceedings of the 19th National Information Systems Security Conference (NISSC'96), pages 526--538, Baltimore, MD, USA, Oct. 1996. National Institute of Standards and Technology (NIST)."},{"volume-title":"Proceedings of Artificial Immune System Workshop, Proceedings of 2000 Genetic and Evolutionary Computation Conference.","author":"Hammer P. K.","key":"e_1_3_2_1_10_1","unstructured":"P. K. Hammer , and G. B. Lamont , An Agent based Architecture for a Computer Virus Immune Systems , Proceedings of Artificial Immune System Workshop, Proceedings of 2000 Genetic and Evolutionary Computation Conference. P. K. Hammer, and G. B. Lamont, An Agent based Architecture for a Computer Virus Immune Systems, Proceedings of Artificial Immune System Workshop, Proceedings of 2000 Genetic and Evolutionary Computation Conference."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2002.1011540"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1162\/106365600568257"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1128\/JCM.41.5.2055-2061.2003"},{"key":"e_1_3_2_1_15_1","volume-title":"IJCAI","author":"Kohavi R.","year":"1995","unstructured":"R. Kohavi , A study of cross-validation and bootstrap for accuracy estimation and model selection , IJCAI , 1995 . R. Kohavi, A study of cross-validation and bootstrap for accuracy estimation and model selection, IJCAI, 1995."},{"key":"e_1_3_2_1_16_1","volume-title":"New Ideas in Optimization, eds. Corne, Dorigo, and Glover","author":"Lamont G. B.","year":"1999","unstructured":"G. B. Lamont , R. Marmelstein , D. Van Veldhuizen , A Distributed Architecture for a Self-Adaptive Computer Virus Immune System , in New Ideas in Optimization, eds. Corne, Dorigo, and Glover , McGraw Hill , 1999 . G. B. Lamont, R. Marmelstein, D. Van Veldhuizen, A Distributed Architecture for a Self-Adaptive Computer Virus Immune System, in New Ideas in Optimization, eds. Corne, Dorigo, and Glover, McGraw Hill, 1999."},{"key":"e_1_3_2_1_17_1","volume-title":"Australia. www.biochem.usyd.edu.au\/MBLG2001\/BMedSci\/lecture%2013_Transcription.ppt as of","author":"Molecular Lecture","year":"2005","unstructured":"Lecture notes from School of Molecular and Microbial Sciences . University of Sydney , Australia. www.biochem.usyd.edu.au\/MBLG2001\/BMedSci\/lecture%2013_Transcription.ppt as of 30 Aug 2005 . Lecture notes from School of Molecular and Microbial Sciences. University of Sydney, Australia. www.biochem.usyd.edu.au\/MBLG2001\/BMedSci\/lecture%2013_Transcription.ppt as of 30 Aug 2005."},{"key":"e_1_3_2_1_18_1","first-page":"328","volume-title":"Proceedings of the ISADS 1999","author":"Okamoto T.","unstructured":"T. Okamoto and Y. Ishida , A Distributed Approach to Computer Virus Detection and Neutralization by Autonomous and Heterogeneous Agents , Proceedings of the ISADS 1999 pp. 328 -- 331 . T. Okamoto and Y. Ishida, A Distributed Approach to Computer Virus Detection and Neutralization by Autonomous and Heterogeneous Agents, Proceedings of the ISADS 1999 pp. 328--331."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.90.5.1691"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/882495.884439"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1068009.1068063"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/1050957"},{"key":"e_1_3_2_1_23_1","first-page":"51","volume-title":"An overview of artificial immune systems in R","author":"Timmis A. J.","year":"2004","unstructured":"A. J. Timmis , T. Knight , L. N. De Castro , and E. Hart , An overview of artificial immune systems in R . Paton, H. Bolouri, M. Holcombe, J. H. Parish, and R. Tateson, editors, \"Computation in Cells and Tissues: Perspectives and Tools for Thought\", Natural Computation Series, pages 51 -- 86 . Springer , November 2004 . A. J. Timmis, T. Knight, L. N. De Castro, and E. Hart, An overview of artificial immune systems in R. Paton, H. Bolouri, M. Holcombe, J. H. Parish, and R. Tateson, editors, \"Computation in Cells and Tissues: Perspectives and Tools for Thought\", Natural Computation Series, pages 51--86. Springer, November 2004."},{"key":"e_1_3_2_1_24_1","volume-title":"Lamont","author":"Williams P. D.","year":"2001","unstructured":"P. D. Williams , K. Anchor , J. Bebo , G. Gunsch , G. Lamont , Warthog : Towards a Computer Immune System for Detecting \"Low and Slow\" Information System Attacks, Recent Advances in Intrusion Detection, RAID , 2001 . P. D. Williams, K. Anchor, J. Bebo, G. Gunsch, G. Lamont, Warthog: Towards a Computer Immune System for Detecting \"Low and Slow\" Information System Attacks, Recent Advances in Intrusion Detection, RAID, 2001."},{"issue":"3","key":"e_1_3_2_1_25_1","first-page":"467","volume":"26","author":"Yao X.","year":"1997","unstructured":"X. Yao and Y. Liu , Fast Evolution Strategies, Control & Cybernetics. , vol. 26 , no. 3 , pp. 467 -- 496 , 1997 . X. Yao and Y. Liu, Fast Evolution Strategies, Control & Cybernetics., vol. 26, no. 3, pp. 467--496, 1997.","journal-title":"Fast Evolution Strategies, Control & Cybernetics."}],"event":{"name":"GECCO06: Genetic and Evolutionary Computation Conference","sponsor":["SIGEVO ACM Special Interest Group on Genetic and Evolutionary Computation","ACM Association for Computing Machinery"],"location":"Seattle Washington USA","acronym":"GECCO06"},"container-title":["Proceedings of the 8th annual conference on Genetic and evolutionary computation"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1143997.1144016","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1143997.1144016","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T15:06:29Z","timestamp":1750259189000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1143997.1144016"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,7,8]]},"references-count":24,"alternative-id":["10.1145\/1143997.1144016","10.1145\/1143997"],"URL":"https:\/\/doi.org\/10.1145\/1143997.1144016","relation":{},"subject":[],"published":{"date-parts":[[2006,7,8]]},"assertion":[{"value":"2006-07-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}