{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:33:13Z","timestamp":1750307593661,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":14,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,3,22]],"date-time":"2010-03-22T00:00:00Z","timestamp":1269216000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,3,22]]},"DOI":"10.1145\/1774088.1774502","type":"proceedings-article","created":{"date-parts":[[2010,4,27]],"date-time":"2010-04-27T12:45:48Z","timestamp":1272372348000},"page":"1950-1957","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Novel immune-based framework for securing ad hoc networks"],"prefix":"10.1145","author":[{"given":"Yasir Abdelgadir","family":"Mohamed","sequence":"first","affiliation":[{"name":"Universiti Teknologi PETRONAS, Bandar Seri Iskandar, Tronoh, Malaysia"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Azween B.","family":"Abdullah","sequence":"additional","affiliation":[{"name":"Universiti Teknologi PETRONAS, Bandar Seri Iskandar, Tronoh, Malaysia"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2010,3,22]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/161468.161471"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2005.11.005"},{"key":"e_1_3_2_1_4_1","first-page":"417","volume-title":"RF and Microwave conference proceedings","author":"Kashif Saleem","year":"2009","unstructured":"Kashif Saleem , Norsheila Fisal, \" Bio-Inspired Self -organized Secure Autonomous Routing Protocol for WSN\", international RF and Microwave conference proceedings , 2009 , pp. 417 -- 421 . Kashif Saleem, Norsheila Fisal, \"Bio-Inspired Self-organized Secure Autonomous Routing Protocol for WSN\", international RF and Microwave conference proceedings, 2009, pp. 417--421."},{"key":"e_1_3_2_1_5_1","first-page":"107","article-title":"A Hybrid Model for Immune Inspired Network Intrusion Detection","author":"Robert L.","year":"2008","unstructured":"Robert L. Fanelli , \" A Hybrid Model for Immune Inspired Network Intrusion Detection \", Springer journal , 2008 , pp. 107 -- 118 . Robert L. Fanelli, \"A Hybrid Model for Immune Inspired Network Intrusion Detection\", Springer journal, 2008, pp. 107--118.","journal-title":"Springer journal"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-27835-1_29"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30220-9_28"},{"key":"e_1_3_2_1_10_1","first-page":"231","article-title":"Security Mechanism for MANETs","volume":"2008","author":"Mohamed Y.","unstructured":"Mohamed , Y. and Abdullah , A . Security Mechanism for MANETs , Journal of Engineering and Science Technology , 2008 pp. 231 -- 242 . Mohamed, Y. and Abdullah, A. Security Mechanism for MANETs, Journal of Engineering and Science Technology, 2008 pp. 231--242.","journal-title":"Journal of Engineering and Science Technology"},{"key":"e_1_3_2_1_11_1","first-page":"211","article-title":"On the Interaction of Bandwidth Constraints and Energy Efficiency in All-Wireless Networks","volume":"2865","author":"Tommy Chu","year":"2003","unstructured":"Tommy Chu and Ioanis Nikolaidis , \" On the Interaction of Bandwidth Constraints and Energy Efficiency in All-Wireless Networks \", Springer, LNCS 2865 , 2003 , pp. 211 -- 222 . Tommy Chu and Ioanis Nikolaidis, \"On the Interaction of Bandwidth Constraints and Energy Efficiency in All-Wireless Networks\", Springer, LNCS 2865, 2003, pp. 211--222.","journal-title":"Springer, LNCS"},{"issue":"7","key":"e_1_3_2_1_12_1","first-page":"206","article-title":"Immune Inspired Approach for Securing Wireless Ad hoc Networks","volume":"9","author":"Mohamed Y","unstructured":"Mohamed , Y , and Abdullah , A . \" Immune Inspired Approach for Securing Wireless Ad hoc Networks \", International Journal of Computer Science and Security(IJCSNS) , vol 9 , No 7 , pp 206 -- 212 . Mohamed, Y, and Abdullah, A. \"Immune Inspired Approach for Securing Wireless Ad hoc Networks\", International Journal of Computer Science and Security(IJCSNS), vol 9, No 7, pp 206--212.","journal-title":"International Journal of Computer Science and Security(IJCSNS)"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/882490.884218"},{"key":"e_1_3_2_1_15_1","first-page":"1","volume-title":"IEEE Symposium on Foundations of Computational Intelligence","author":"Sankalp Balachandran","year":"2007","unstructured":"Sankalp Balachandran , Dipankar Dasgupta, Fernando Nino , Deon Garrett, \"A Framework for Evolving Multi-Shaped Detectors in Negative Selection\" , IEEE Symposium on Foundations of Computational Intelligence , 2007 , pp. 1 -- 8 . Sankalp Balachandran, Dipankar Dasgupta, Fernando Nino, Deon Garrett, \"A Framework for Evolving Multi-Shaped Detectors in Negative Selection\", IEEE Symposium on Foundations of Computational Intelligence, 2007, pp. 1--8."},{"key":"e_1_3_2_1_16_1","unstructured":"Steven A. Hofmeyr. \"An immunological model of distributed detection and its application to computer security\" PhD thesis University of New Mexico Albuquerque NM. (1999).   Steven A. Hofmeyr. \" An immunological model of distributed detection and its application to computer security \" PhD thesis University of New Mexico Albuquerque NM. (1999)."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/525080.884257"},{"key":"e_1_3_2_1_18_1","volume-title":"2nd International Conference on Artificial Immune Systems, LNCS 2787 147--155","author":"Aickelin U.","year":"2003","unstructured":"Aickelin U. , Bentley P. , Cayzer S. , Kim J. and McLeod J. ( 2003 ). \" Danger Theory: The Link between AIS and IDS?\" In Proceedings ICARIS-2003 , 2nd International Conference on Artificial Immune Systems, LNCS 2787 147--155 . Aickelin U., Bentley P., Cayzer S., Kim J. and McLeod J. (2003). \"Danger Theory: The Link between AIS and IDS?\" In Proceedings ICARIS-2003, 2nd International Conference on Artificial Immune Systems, LNCS 2787 147--155."}],"event":{"name":"SAC'10: The 2010 ACM Symposium on Applied Computing","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing"],"location":"Sierre Switzerland","acronym":"SAC'10"},"container-title":["Proceedings of the 2010 ACM Symposium on Applied Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1774088.1774502","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1774088.1774502","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:41:34Z","timestamp":1750250494000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1774088.1774502"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,3,22]]},"references-count":14,"alternative-id":["10.1145\/1774088.1774502","10.1145\/1774088"],"URL":"https:\/\/doi.org\/10.1145\/1774088.1774502","relation":{},"subject":[],"published":{"date-parts":[[2010,3,22]]},"assertion":[{"value":"2010-03-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}