{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T06:20:54Z","timestamp":1730269254069,"version":"3.28.0"},"reference-count":13,"publisher":"IEEE Comput. Soc","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/ipdps.2003.1213279","type":"proceedings-article","created":{"date-parts":[[2004,3,22]],"date-time":"2004-03-22T14:34:28Z","timestamp":1079966068000},"page":"8","source":"Crossref","is-referenced-by-count":1,"title":["Human immune anomaly and misuse based detection for computer system operations: part II"],"prefix":"10.1109","author":[{"given":"K.R.L.","family":"Juca","sequence":"first","affiliation":[]},{"given":"A.","family":"Boukerche","sequence":"additional","affiliation":[]},{"given":"J.B.M.","family":"Sobral","sequence":"additional","affiliation":[]},{"given":"M.S.M.A.","family":"Notare","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Classification and detection of computer intrusions","year":"1995","author":"kumar","key":"ref10"},{"journal-title":"SI Understanding the Immune System National Institutes of Health National Cancer Institute U S Dept of Health and Human Services Public Health Service","year":"1997","key":"ref11"},{"journal-title":"Principies of a Computer Immune System","year":"1997","author":"somayaji","key":"ref12"},{"journal-title":"AMaViS - A Mail Virus Scanner © 1997 2000 Mogens Kjaer Carlsberg Laboratory","year":"0","key":"ref13"},{"journal-title":"AntiVir for Linux ©","year":"2000","key":"ref14"},{"key":"ref4","first-page":"361","author":"forrest","year":"2000","journal-title":"Design Principles for Immune System & Print Distributed Autonomous Systems"},{"journal-title":"An Architecture for Intrusion Detection using Autonomous Agents Coast Laboratory Purdue University West Lafayette","year":"1998","author":"balasubramaniyan","key":"ref3"},{"journal-title":"An immunological model of distributed detection and its application to computer security","year":"1999","author":"hofmeyer","key":"ref6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1996.502675"},{"key":"ref8","article-title":"Immunizing Computer Networks: Getting All the Machines in Your Network to Fight the Hacker Disease","author":"hofmeyer","year":"1998","journal-title":"Dept of Compt Sc Univ of New Mexico Albuquerque Nove"},{"key":"ref2","article-title":"Use of A Taxonomy of Security Faults","author":"aslam","year":"1996","journal-title":"Department of Computer Sciences Purdue University West Lafayette"},{"journal-title":"An Approach to UNIX Security Logging Goteborg Sweden","year":"1998","author":"axelsson","key":"ref1"},{"key":"ref9","article-title":"State Transition Analysis","volume":"1995","author":"ilgun","year":"0","journal-title":"A Rule-Based Intrusion Detection Approach IEEE Tran on Soft Engineering"}],"event":{"name":"International Parallel and Distributed Processing Symposium (IPDPS 2003)","acronym":"IPDPS-03","location":"Nice, France"},"container-title":["Proceedings International Parallel and Distributed Processing Symposium"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8608\/27277\/01213279.pdf?arnumber=1213279","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,13]],"date-time":"2017-03-13T19:17:38Z","timestamp":1489432658000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1213279\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/ipdps.2003.1213279","relation":{},"subject":[]}}