{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:32:00Z","timestamp":1750307520513,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2008,7,15]],"date-time":"2008-07-15T00:00:00Z","timestamp":1216080000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2008,7,15]]},"DOI":"10.1145\/1600176.1600185","type":"proceedings-article","created":{"date-parts":[[2009,9,8]],"date-time":"2009-09-08T12:53:09Z","timestamp":1252414389000},"page":"49-54","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["The future of biologically-inspired security"],"prefix":"10.1145","author":[{"given":"Anil","family":"Somayaji","sequence":"first","affiliation":[{"name":"Carleton University, Ottawa, Ontario, Canada"}]},{"given":"Michael","family":"Locasto","sequence":"additional","affiliation":[{"name":"Columbia University, New York"}]},{"given":"Jan","family":"Feyereisl","sequence":"additional","affiliation":[{"name":"University of Nottingham, Nottingham, England, UK"}]}],"member":"320","published-online":{"date-parts":[[2008,7,15]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1053283.1053286"},{"key":"e_1_3_2_1_2_1","volume-title":"Proceedings of the 12th USENIX Security Symposium","author":"Bhatkar S.","year":"2003","unstructured":"S. Bhatkar , D. C. DuVarney , and R. Sekar . Address obfuscation: An efficient approach to combat a broad range of memory error exploits . In Proceedings of the 12th USENIX Security Symposium , 2003 . S. Bhatkar, D. C. DuVarney, and R. Sekar. Address obfuscation: An efficient approach to combat a broad range of memory error exploits. In Proceedings of the 12th USENIX Security Symposium, 2003."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/1037990.1038024"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/FTCSH.1995.532621"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-59901-9","volume-title":"Artificial Immune Systems and Their Applications","author":"Dasgupta D.","year":"1999","unstructured":"D. Dasgupta , editor. Artificial Immune Systems and Their Applications . Springer-Verlag, Inc. , Berlin , 1999 . D. Dasgupta, editor. Artificial Immune Systems and Their Applications. Springer-Verlag, Inc., Berlin, 1999."},{"key":"e_1_3_2_1_8_1","volume-title":"Proceedings of the 22nd National Information Systems Security Conference","author":"Dasgupta D.","year":"1999","unstructured":"D. Dasgupta . Immunity-based intrusion detection system: A general framework . In Proceedings of the 22nd National Information Systems Security Conference , 1999 . D. Dasgupta. Immunity-based intrusion detection system: A general framework. In Proceedings of the 22nd National Information Systems Security Conference, 1999."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/829515.830554"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/525080.884258"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/882490.884218"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/822075.822408"},{"key":"e_1_3_2_1_13_1","unstructured":"D. Geer et al. Cyberinsecurity: The cost of monopoly how the dominance of microsoft's products poses a risk to security. http:\/\/cryptome.org\/cyberinsecurity.htm September 2003.  D. Geer et al. Cyberinsecurity: The cost of monopoly how the dominance of microsoft's products poses a risk to security. http:\/\/cryptome.org\/cyberinsecurity.htm September 2003."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/11536444_12"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948146"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2003.1160055"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-73986-9_2"},{"key":"e_1_3_2_1_19_1","volume-title":"Proceedings of the 7th European Conference on Intelligent Techniques and Soft Computing (EUFIT '99)","author":"Kim J.","year":"1999","unstructured":"J. Kim and P. Bentley . The artificial immune model for network intrusion detection . In Proceedings of the 7th European Conference on Intelligent Techniques and Soft Computing (EUFIT '99) , Aachen, Germany , 1999 . J. Kim and P. Bentley. The artificial immune model for network intrusion detection. In Proceedings of the 7th European Conference on Intelligent Techniques and Soft Computing (EUFIT '99), Aachen, Germany, 1999."},{"key":"e_1_3_2_1_20_1","unstructured":"PaX Team. PaX address space layout randomization (ASLR). http:\/\/pax.grsecurity.net\/docs\/aslr.txt.  PaX Team. PaX address space layout randomization (ASLR). http:\/\/pax.grsecurity.net\/docs\/aslr.txt."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/882495.884433"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/283699.283742"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1162\/artl.1994.1.249"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/306549.306577"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/11536444_9"},{"key":"e_1_3_2_1_27_1","first-page":"285","volume-title":"Proceedings of the 12th USENIX Security Symposium","author":"Twycross J.","year":"2003","unstructured":"J. Twycross and M. M. Williamson . Implementing and testing a virus throttle . In Proceedings of the 12th USENIX Security Symposium , pages 285 -- 294 , 2003 . J. Twycross and M. M. Williamson. Implementing and testing a virus throttle. In Proceedings of the 12th USENIX Security Symposium, pages 285--294, 2003."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586145"}],"event":{"name":"NSPW '07: Proceedings of the 2007 New Security Paradigms Workshop","sponsor":["San Diego Super Computing Ctr San Diego Super Computing Ctr","James Madison University","ACSA Applied Computing Security Assoc"],"location":"New Hampshire","acronym":"NSPW '07"},"container-title":["Proceedings of the 2007 Workshop on New Security Paradigms"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1600176.1600185","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1600176.1600185","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:18:16Z","timestamp":1750249096000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1600176.1600185"}},"subtitle":["is there anything left to learn?"],"short-title":[],"issued":{"date-parts":[[2008,7,15]]},"references-count":24,"alternative-id":["10.1145\/1600176.1600185","10.1145\/1600176"],"URL":"https:\/\/doi.org\/10.1145\/1600176.1600185","relation":{},"subject":[],"published":{"date-parts":[[2008,7,15]]},"assertion":[{"value":"2008-07-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}