{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T11:46:07Z","timestamp":1725795967568},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319079943"},{"type":"electronic","value":"9783319079950"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-07995-0_38","type":"book-chapter","created":{"date-parts":[[2014,6,10]],"date-time":"2014-06-10T23:24:31Z","timestamp":1402442671000},"page":"385-395","source":"Crossref","is-referenced-by-count":1,"title":["Mobile Agent Security Based on Artificial Immune System"],"prefix":"10.1007","author":[{"given":"Zaki","family":"Brahmi","sequence":"first","affiliation":[]},{"given":"Amine","family":"Lini","sequence":"additional","affiliation":[]},{"given":"Mohamed Mohsen","family":"Gammoudi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"unstructured":"de Castro, L.N., Von Zuben, F.J.: Artificial immune system, Part I - Basic theory and applications. Technical Report, RT DCA 01\/99 (December 1999)","key":"38_CR1"},{"doi-asserted-by":"crossref","unstructured":"Dasgupta, D., Nino, L.F.: Immunological Computation. Theory and Applications. Taylor and Francis Group, LLC (2009)","key":"38_CR2","DOI":"10.1201\/9781420065466"},{"unstructured":"Von Zuben, F.J., De Castro, L.N.: aiNet: An artificial Immune Network for Data analysis. In: Abbass, H.A., Sarker, R.A., Newlton, C.S. (eds.) Data Mining: A Heuristic Approach, ch.\u00a0XII, pp. 213\u2013259. Idea Group Publishing, USA (2001)","key":"38_CR3"},{"unstructured":"Kawamoto, H., Miyake, S., Miyasaka, M., Ohteki, T., Sorimachi, N., Takahama, Y., Taki, S.: Your Amazing Immune System - How it protects your body. French Translation: European Federation of Immunological Societies in 2010 (2010)","key":"38_CR4"},{"unstructured":"Mishra, A., Choudhary, A.: Mobile Agent:Security Issues and Solution. International Journal of Computer Technology and Electronics Engineering (IJCTEE)\u00a02(6) (December 2012)","key":"38_CR5"},{"doi-asserted-by":"crossref","unstructured":"Snehi, J., Snehi, M., Goyal, S.: Security Threats to Mobile Agents. In: ACAI 2011, July 21-July 22 (2011)","key":"38_CR6","DOI":"10.1145\/2007052.2007098"},{"doi-asserted-by":"crossref","unstructured":"Dadhich, P., Dutta, K., Govil, M.C.: Security Issues in Mobile Agents. International Journal of Computer Applications\u00a011(4), 0975\u20138887 (2010)","key":"38_CR7","DOI":"10.5120\/1574-2104"},{"doi-asserted-by":"crossref","unstructured":"Shen, Z., Tong, Q.: A Security Technology for Mobile Agent System Improved by Trusted Computing Platform. In: Ninth International Conference on Hybrid Intelligent Systems 2009. IEEE Computer Society (2009)","key":"38_CR8","DOI":"10.1109\/HIS.2009.222"},{"key":"38_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"347","DOI":"10.1007\/978-3-642-04875-3_37","volume-title":"Active Media Technology","author":"M. Ilahi","year":"2009","unstructured":"Ilahi, M., Brahmi, Z., Gammoudi, M.M.: Enhancing Decentralized MAS-Based Framework for Composite Web Services Orchestration and Exception Handling by Means of Mobile Agents Technology. In: Liu, J., Wu, J., Yao, Y., Nishida, T. (eds.) AMT 2009. LNCS, vol.\u00a05820, pp. 347\u2013356. Springer, Heidelberg (2009)"},{"unstructured":"Rajguru, P.V., Deshmukh, S.B.: Current trends and analysis of mobile agent application. World Journal of Science and Technology, 01\u201306 (2012)","key":"38_CR10"},{"unstructured":"Hightower, R.R., Forrest, S., Perelson, A.S.: The evolution of emergent organization in immune system gene libraries. In: Pro. of the 6th International Conference on Genetic Algorithms, pp. 344\u2013350 (1995)","key":"38_CR11"},{"doi-asserted-by":"crossref","unstructured":"Qiu, W., Guan, H., Jiang, X., Huang, Z.: Group oriented Secure Routing Protocol of Mobile Agents. In: International Conference on Computational Intelligence and Security Workshops 2007. IEEE Computer Society (2007)","key":"38_CR12","DOI":"10.1109\/CISW.2007.4425549"},{"unstructured":"De Castro, L.N., Von Zuben, F.J.: The clonal selection algorithm with engineering application. In: Proc. of GECCO 2000, Workshop Proceeding, pp. 36\u201337 (2000)","key":"38_CR13"},{"unstructured":"Timmis, J.: Artificial Immune Systems: A novel data analysis technique inspired by the immune network theory. PhD Thesis, University of Wales (2001)","key":"38_CR14"},{"unstructured":"Ahuja, P., Sharma, V.: A Review on Mobile Agent Security. International Journal of Recent Technology and Engineering (IJRTE)\u00a01(2) (June 2012) ISSN: 2277-3878","key":"38_CR15"},{"issue":"1","key":"38_CR16","doi-asserted-by":"publisher","first-page":"250","DOI":"10.1016\/j.future.2010.12.017","volume":"29","author":"A. Herrero","year":"2013","unstructured":"Herrero, A., Navarro, M., Corchado, E., Julian, V.: RT-MOVICAB-IDS: Addressing real-time intrusion detection. Future Generation Comp. Syst.\u00a029(1), 250\u2013261 (2013)","journal-title":"Future Generation Comp. Syst."}],"container-title":["Advances in Intelligent Systems and Computing","International Joint Conference SOCO\u201914-CISIS\u201914-ICEUTE\u201914"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-07995-0_38","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,20]],"date-time":"2023-02-20T04:36:50Z","timestamp":1676867810000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-07995-0_38"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319079943","9783319079950"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-07995-0_38","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2014]]}}}