{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:25:52Z","timestamp":1750220752722,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":6,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,7,8]],"date-time":"2020-07-08T00:00:00Z","timestamp":1594166400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,7,8]]},"DOI":"10.1145\/3377929.3389995","type":"proceedings-article","created":{"date-parts":[[2020,8,26]],"date-time":"2020-08-26T15:26:55Z","timestamp":1598455615000},"page":"95-96","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["An artificial sequential immune responses model for anomaly detection"],"prefix":"10.1145","author":[{"given":"Wen","family":"Zhou","sequence":"first","affiliation":[{"name":"Wuhan University, Wuhan, China"}]},{"given":"Yiwen","family":"Liang","sequence":"additional","affiliation":[{"name":"Wuhan University, Wuhan, China"}]}],"member":"320","published-online":{"date-parts":[[2020,7,8]]},"reference":[{"key":"e_1_3_2_2_1_1","first-page":"67","article-title":"CloudIDS: Cloud intrusion detection model inspired by dendritic cell mechanism","volume":"9","author":"Ahmad Azuan","year":"2017","unstructured":"Azuan Ahmad , Norbik Bashah Idris , and Mohd Nazri Kama . 2017 . CloudIDS: Cloud intrusion detection model inspired by dendritic cell mechanism . International Journal of Communication Networks and Information Security 9 , 1 (2017), 67 -- 75 . Azuan Ahmad, Norbik Bashah Idris, and Mohd Nazri Kama. 2017. CloudIDS: Cloud intrusion detection model inspired by dendritic cell mechanism. International Journal of Communication Networks and Information Security 9, 1 (2017), 67--75.","journal-title":"International Journal of Communication Networks and Information Security"},{"key":"e_1_3_2_2_2_1","first-page":"8","article-title":"Immunological Recognition of Self","volume":"33","author":"Burnet Frank Macfarlane","year":"2010","unstructured":"Frank Macfarlane Burnet . 2010 . Immunological Recognition of Self . Science 33 , 1 (2010), 8 . Frank Macfarlane Burnet. 2010. Immunological Recognition of Self. Science 33, 1 (2010), 8.","journal-title":"Science"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSCloud.2017.12"},{"key":"e_1_3_2_2_4_1","volume-title":"annual review of immunology 12, 1","author":"Matzinger P","year":"1994","unstructured":"P Matzinger . 1994. Tolerance, Danger, and the Extended Family . annual review of immunology 12, 1 ( 1994 ), 991--1045. P Matzinger. 1994. Tolerance, Danger, and the Extended Family. annual review of immunology 12, 1 (1994), 991--1045."},{"key":"e_1_3_2_2_5_1","volume-title":"Sequential Immune Responses: The Weapons of Immunity. Journal of Innate Immunity","author":"Mills Charles D.","year":"2015","unstructured":"Charles D. Mills , Klaus Ley , Kurt Buchmann , and Johnathan Canton . 2015. Sequential Immune Responses: The Weapons of Immunity. Journal of Innate Immunity ( 2015 ), 444--450. Charles D. Mills, Klaus Ley, Kurt Buchmann, and Johnathan Canton. 2015. Sequential Immune Responses: The Weapons of Immunity. Journal of Innate Immunity (2015), 444--450."},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13369-017-2426-1"}],"event":{"name":"GECCO '20: Genetic and Evolutionary Computation Conference","sponsor":["SIGEVO ACM Special Interest Group on Genetic and Evolutionary Computation"],"location":"Canc\u00fan Mexico","acronym":"GECCO '20"},"container-title":["Proceedings of the 2020 Genetic and Evolutionary Computation Conference Companion"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3377929.3389995","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3377929.3389995","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:38:55Z","timestamp":1750199935000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3377929.3389995"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7,8]]},"references-count":6,"alternative-id":["10.1145\/3377929.3389995","10.1145\/3377929"],"URL":"https:\/\/doi.org\/10.1145\/3377929.3389995","relation":{},"subject":[],"published":{"date-parts":[[2020,7,8]]},"assertion":[{"value":"2020-07-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}