{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,6]],"date-time":"2024-10-06T04:14:40Z","timestamp":1728188080353},"reference-count":36,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2022,11,1]],"date-time":"2022-11-01T00:00:00Z","timestamp":1667260800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2022,11,1]],"date-time":"2022-11-01T00:00:00Z","timestamp":1667260800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2022,11,1]],"date-time":"2022-11-01T00:00:00Z","timestamp":1667260800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2022,11,1]],"date-time":"2022-11-01T00:00:00Z","timestamp":1667260800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2022,11,1]],"date-time":"2022-11-01T00:00:00Z","timestamp":1667260800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,11,1]],"date-time":"2022-11-01T00:00:00Z","timestamp":1667260800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Applied Soft Computing"],"published-print":{"date-parts":[[2022,11]]},"DOI":"10.1016\/j.asoc.2022.109680","type":"journal-article","created":{"date-parts":[[2022,10,8]],"date-time":"2022-10-08T01:55:08Z","timestamp":1665194108000},"page":"109680","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":6,"special_numbering":"C","title":["A generic cyber immune framework for anomaly detection using artificial immune systems"],"prefix":"10.1016","volume":"130","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-4129-3861","authenticated-orcid":false,"given":"B.J.","family":"Bejoy","sequence":"first","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-7871-1801","authenticated-orcid":false,"given":"G.","family":"Raju","sequence":"additional","affiliation":[]},{"given":"Debabrata","family":"Swain","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-6506-9207","authenticated-orcid":false,"given":"Biswaranjan","family":"Acharya","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-5055-3645","authenticated-orcid":false,"given":"Yu-Chen","family":"Hu","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.asoc.2022.109680_b1","first-page":"1","article-title":"CSI computer crime and security survey","volume":"1","author":"Richardson","year":"2008","journal-title":"Comput. Secur. Inst."},{"year":"2002","series-title":"Artificial Immune Systems: A New Computational Intelligence Approach","author":"de\u00a0Castro","key":"10.1016\/j.asoc.2022.109680_b2"},{"key":"10.1016\/j.asoc.2022.109680_b3","doi-asserted-by":"crossref","unstructured":"S. Stepney, R.E. Smith, J. Timmis, A.M. Tyrrell, Towards a Conceptual Framework for Artificial Immune Systems, in: Int. Conf. Artif. Immune Syst, 2004, pp. 53\u201364.","DOI":"10.1007\/978-3-540-30220-9_5"},{"key":"10.1016\/j.asoc.2022.109680_b4","doi-asserted-by":"crossref","unstructured":"J. Twycross, U. Aickelin, Towards a Conceptual Framework for Innate Immunity, in: Int. Conf. Artif. Immune Syst, 2005, pp. 112\u2013125.","DOI":"10.1007\/11536444_9"},{"key":"10.1016\/j.asoc.2022.109680_b5","doi-asserted-by":"crossref","unstructured":"M.E.M. Ahmed, Hybrid conceptual framework for the artificial immune system, in: Int. Conf. Comput. Electr. Electron. Eng., ICCEEE, 2013, pp. 249\u2013252.","DOI":"10.1109\/ICCEEE.2013.6633942"},{"key":"10.1016\/j.asoc.2022.109680_b6","doi-asserted-by":"crossref","unstructured":"M.T. Khan, Izhar, F. Nasir, M.U. Qadir, J. Iqbal, Artificial immune system-based framework for multi-robot cooperation, in: Int. Conf. Comput. Sci. Educ., ICCCSE, 2014, pp. 50\u201355.","DOI":"10.1109\/ICCSE.2014.6926429"},{"key":"10.1016\/j.asoc.2022.109680_b7","doi-asserted-by":"crossref","unstructured":"Y. Tan, G. Mi, Y. Zhu, C. Deng, Article title, Artificial Immune System Based Methods for Spam Filtering, in: Int. Sympo of Circuits and Systems, ISCAS, 2013, pp. 2484\u20132488.","DOI":"10.1109\/ISCAS.2013.6572383"},{"key":"10.1016\/j.asoc.2022.109680_b8","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1155\/2014\/425853","article-title":"A survey of artificial immune system-based intrusion detection","volume":"2014","author":"Yang","year":"2014","journal-title":"Sci. World J."},{"key":"10.1016\/j.asoc.2022.109680_b9","doi-asserted-by":"crossref","first-page":"286","DOI":"10.1016\/j.engappai.2014.06.022","article-title":"MAIS-IDS: A distributed intrusion detection system using multi-agent AIS approach","volume":"35","author":"Seresht","year":"2014","journal-title":"Eng. Appl. Artif. Intell."},{"key":"10.1016\/j.asoc.2022.109680_b10","first-page":"587","article-title":"Dynamically real-time intrusion detection algorithm with immune network","volume":"11","author":"Hu","year":"2015","journal-title":"J. Comput. Inf. Syst."},{"key":"10.1016\/j.asoc.2022.109680_b11","doi-asserted-by":"crossref","first-page":"78","DOI":"10.1016\/j.neucom.2011.07.031","article-title":"Host-based intrusion detection systems adapted from agent-based artificial immune systems","volume":"88","author":"Ou","year":"2012","journal-title":"Neurocomputing"},{"issue":"2","key":"10.1016\/j.asoc.2022.109680_b12","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1016\/j.knosys.2008.07.005","article-title":"Distributed agents\u2019 model for intrusion detection based on AIS","volume":"22","author":"Yang","year":"2008","journal-title":"Knowl.-Based Syst."},{"key":"10.1016\/j.asoc.2022.109680_b13","doi-asserted-by":"crossref","first-page":"94","DOI":"10.1016\/j.swevo.2017.07.002","article-title":"Adaptive artificial immune networks for mitigating DoS flooding attacks","volume":"38","author":"Vidal","year":"2018","journal-title":"Swarm Evol. Comput."},{"key":"10.1016\/j.asoc.2022.109680_b14","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1007\/s10489-009-0202-y","article-title":"A novel intrusion detection approach learned from the change of antibody concentration in biological immune response","volume":"35","author":"Zeng","year":"2011","journal-title":"Appl. Intell."},{"key":"10.1016\/j.asoc.2022.109680_b15","doi-asserted-by":"crossref","first-page":"311","DOI":"10.1016\/j.eswa.2016.03.042","article-title":"An efficient proactive artificial immune system based anomaly detection and prevention system","volume":"60","author":"Saurabh","year":"2016","journal-title":"Expert Syst. Appl."},{"issue":"1","key":"10.1016\/j.asoc.2022.109680_b16","doi-asserted-by":"crossref","first-page":"1275","DOI":"10.1016\/j.asoc.2010.03.004","article-title":"A cooperative immunological approach for detecting network anomaly","volume":"11","author":"Sobh","year":"2011","journal-title":"Appl. Soft Comput."},{"issue":"4","key":"10.1016\/j.asoc.2022.109680_b17","doi-asserted-by":"crossref","first-page":"288","DOI":"10.1108\/IMCS-11-2012-0063","article-title":"Anomaly detection based on hybrid artificial immune principles","volume":"21","author":"Sobh","year":"2013","journal-title":"Inf. Manag. Comput. Secur."},{"issue":"7","key":"10.1016\/j.asoc.2022.109680_b18","doi-asserted-by":"crossref","first-page":"5507","DOI":"10.1016\/j.eswa.2010.02.004","article-title":"Design of an artificial immune system for fault detection: A negative selection approach","volume":"37","author":"Laurentys","year":"2010","journal-title":"Expert Syst. Appl."},{"key":"10.1016\/j.asoc.2022.109680_b19","doi-asserted-by":"crossref","first-page":"158","DOI":"10.1016\/j.neucom.2012.08.076","article-title":"Immune cooperation mechanism based learning framework","volume":"148","author":"Zhang","year":"2015","journal-title":"NeuroComputing"},{"key":"10.1016\/j.asoc.2022.109680_b20","doi-asserted-by":"crossref","unstructured":"M. Tabatabaefar, M. Miriestahbanati, J.C. Gregoire, Network Intrusion Detection through Artificial Immune System, in: 11th Annu. IEEE Int. Syst. Conf, 2017, pp. 334\u2013339.","DOI":"10.1109\/SYSCON.2017.7934751"},{"issue":"4","key":"10.1016\/j.asoc.2022.109680_b21","doi-asserted-by":"crossref","first-page":"267","DOI":"10.1007\/s11416-011-0154-8","article-title":"Run-time malware detection based on positive selection","volume":"7","author":"Fuyong","year":"2011","journal-title":"J. Comput. Virol."},{"key":"10.1016\/j.asoc.2022.109680_b22","doi-asserted-by":"crossref","unstructured":"J. Fu, H. Yang, Y. Liang, C. Tan, Bait a Trap: Introducing Natural Killer Cells to Artificial Immune System for Spyware Detection, in: International Conference on Artificial Immune Systems (ICARIS) Lecture Notes in Computer Science, Vol. 7597, 2012, p. 125138.","DOI":"10.1007\/978-3-642-33757-4_10"},{"key":"10.1016\/j.asoc.2022.109680_b23","doi-asserted-by":"crossref","unstructured":"K. Luther, R. Bye, T. Alpcan, A. M\u00fcller, S. Albayrak, A cooperative AIS framework for intrusion detection, in: IEEE Int. Conf. Commun, 2007, pp. 1409\u20131416.","DOI":"10.1109\/ICC.2007.237"},{"key":"10.1016\/j.asoc.2022.109680_b24","doi-asserted-by":"crossref","unstructured":"D. Dal, S. Abraham, A. Abraham, S. Sanyal, M. Sanglikar, Evolution induced secondary immunity: An artificial immune system-based intrusion detection system, in: Proc.- 7th Comput. Inf. Syst. Ind. Manag. Appl, CISIM, 2008, pp. 65\u201370.","DOI":"10.1109\/CISIM.2008.31"},{"key":"10.1016\/j.asoc.2022.109680_b25","doi-asserted-by":"crossref","first-page":"145332","DOI":"10.1109\/ACCESS.2020.3015399","article-title":"Towards a hybrid immune algorithm based on danger theory for database security","volume":"8","author":"Said","year":"2020","journal-title":"IEEE Access"},{"key":"10.1016\/j.asoc.2022.109680_b26","doi-asserted-by":"crossref","first-page":"34929","DOI":"10.1109\/ACCESS.2020.2973608","article-title":"Immune system based intrusion detection system (IS-IDS): A proposed model","volume":"8","author":"Dutt","year":"2020","journal-title":"IEEE Access"},{"key":"10.1016\/j.asoc.2022.109680_b27","doi-asserted-by":"crossref","first-page":"47364","DOI":"10.1109\/ACCESS.2018.2866962","article-title":"A multi-level intrusion detection system for wireless sensor networks based on immune theory","volume":"6","author":"Alaparthy","year":"2018","journal-title":"IEEE Access"},{"key":"10.1016\/j.asoc.2022.109680_b28","doi-asserted-by":"crossref","first-page":"100172","DOI":"10.1109\/ACCESS.2020.2997939","article-title":"Artificial immune systems and fuzzy logic to detect flooding attacks in software-defined networks","volume":"8","author":"Scaranti","year":"2020","journal-title":"IEEE Access"},{"key":"10.1016\/j.asoc.2022.109680_b29","doi-asserted-by":"crossref","DOI":"10.1016\/j.asoc.2019.105920","article-title":"A decentralized artificial immune system for solution selection in cyber\u2013physical systems","volume":"86","author":"Semwal","year":"2020","journal-title":"Appl. Soft Comput."},{"key":"10.1016\/j.asoc.2022.109680_b30","doi-asserted-by":"crossref","DOI":"10.1016\/j.asoc.2020.107055","article-title":"A new version of the deterministic dendritic cell algorithm based on numerical differential and immune response","volume":"102","author":"Zhou","year":"2021","journal-title":"Appl. Soft Comput."},{"key":"10.1016\/j.asoc.2022.109680_b31","doi-asserted-by":"crossref","DOI":"10.1016\/j.asoc.2019.105989","article-title":"Local feature selection based on artificial immune system for classification","volume":"87","author":"Wang","year":"2020","journal-title":"Appl. Soft Comput."},{"issue":"1","key":"10.1016\/j.asoc.2022.109680_b32","first-page":"85","article-title":"Enhanced AIS based intrusion detection system using natural killer cells","volume":"8","author":"Bejoy","year":"2017","journal-title":"J. Cyber Secur. Mob."},{"key":"10.1016\/j.asoc.2022.109680_b33","series-title":"Proceedings of the International Conference on ISMAC in Computational Vision and Bio-Engineering 2018","article-title":"An intrusion detection and prevention system using AIS\u2014An NK cell-based approach","volume":"vol.30","author":"Bejoy","year":"2019"},{"issue":"1","key":"10.1016\/j.asoc.2022.109680_b34","first-page":"85","article-title":"Artificial immune system based intrusion detection systems- a comprehensive review","volume":"8","author":"Bejoy","year":"2017","journal-title":"Int. J. Comput. Eng. Technol."},{"key":"10.1016\/j.asoc.2022.109680_b35","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1016\/B978-0-12-800147-9.00005-4","article-title":"How to trigger a killer: modulation of natural killer cell reactivity on many levels","volume":"124","author":"Watzl","year":"2014","journal-title":"Adv. Immunol."},{"key":"10.1016\/j.asoc.2022.109680_b36","unstructured":"NSL-KDD dataset- http:\/\/www.unb.ca\/cic\/datasets\/nsl.html."}],"container-title":["Applied Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1568494622007293?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1568494622007293?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2024,10,5]],"date-time":"2024-10-05T10:51:54Z","timestamp":1728125514000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1568494622007293"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11]]},"references-count":36,"alternative-id":["S1568494622007293"],"URL":"https:\/\/doi.org\/10.1016\/j.asoc.2022.109680","relation":{},"ISSN":["1568-4946"],"issn-type":[{"type":"print","value":"1568-4946"}],"subject":[],"published":{"date-parts":[[2022,11]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"A generic cyber immune framework for anomaly detection using artificial immune systems","name":"articletitle","label":"Article Title"},{"value":"Applied Soft Computing","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.asoc.2022.109680","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2022 Elsevier B.V. All rights reserved.","name":"copyright","label":"Copyright"}],"article-number":"109680"}}