{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,30]],"date-time":"2022-03-30T00:52:12Z","timestamp":1648601532333},"reference-count":9,"publisher":"International Academy Publishing (IAP)","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JSW"],"DOI":"10.4304\/jsw.9.3.785-791","type":"journal-article","created":{"date-parts":[[2014,3,28]],"date-time":"2014-03-28T19:04:10Z","timestamp":1396033450000},"source":"Crossref","is-referenced-by-count":0,"title":["The Clonal Expansion and Memory Strategy Applied to Network Detection"],"prefix":"10.17706","volume":"9","author":[{"given":"Yuling","family":"Tian","sequence":"first","affiliation":[]}],"member":"7163","published-online":{"date-parts":[[2014,3,1]]},"reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.epsr.2010.08.003"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.4304\/jcp.8.8.2059-2068"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2012.6231162"},{"key":"ref4","first-page":"297","article-title":"Immune inspired framework for ad hoc network security","volume-title":"IEEE International Conference on Control and Automation Christchurch","author":"Mohamed","year":"2009","unstructured":"[5] Y. A. Mohamed and A. Abdullah, \"Immune inspired framework for ad hoc network security,\" IEEE International Conference on Control and Automation Christchurch, pp. 297\u2013302, 2009."},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.4304\/jcp.8.12.3111-3118"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1023\/B:GENP.0000036019.81454.41"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30220-9_1"},{"key":"ref8","volume-title":"A novel computational intelligence approach","author":"Leandro","year":"2002","unstructured":"[11] D. Leandro, D. Castro, and J. Timmis, \"A novel computational intelligence approach.\" Berlin, Germany: Springer-Verlag, 2002."},{"key":"ref9","first-page":"1015","volume-title":"Towards an artificial immune system for network intrusion detection An investigation of dynamic clonal selection proceedings of the congress on evolutionary computation","author":"Kim","year":"2002","unstructured":"[12] J. Kim and P. J. Bentley, \"Towards an artificial immune system for network intrusion detection: An investigation of dynamic clonal selection: proceedings of the congress on evolutionary computation,\" Washington, DC, USA: IEEE Computer Society, pp. 1015\u20131025, 2002."}],"container-title":["Journal of Software"],"original-title":[],"deposited":{"date-parts":[[2015,9,15]],"date-time":"2015-09-15T11:26:54Z","timestamp":1442316414000},"score":1,"resource":{"primary":{"URL":"http:\/\/ojs.academypublisher.com\/index.php\/jsw\/article\/view\/12276"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,3,1]]},"references-count":9,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2014,3,1]]}},"URL":"https:\/\/doi.org\/10.4304\/jsw.9.3.785-791","relation":{},"ISSN":["1796-217X"],"issn-type":[{"value":"1796-217X","type":"print"}],"subject":[],"published":{"date-parts":[[2014,3,1]]}}}