{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T21:54:22Z","timestamp":1729634062083,"version":"3.28.0"},"reference-count":65,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,9]]},"DOI":"10.1109\/fas-w.2017.170","type":"proceedings-article","created":{"date-parts":[[2017,10,12]],"date-time":"2017-10-12T20:42:25Z","timestamp":1507840945000},"page":"341-347","source":"Crossref","is-referenced-by-count":1,"title":["Trends towards Bio-Inspired Security Countermeasures for Cloud Environments"],"prefix":"10.1109","author":[{"given":"Siyakha N.","family":"Mthunzi","sequence":"first","affiliation":[]},{"given":"Elhadj","family":"Benkhelifa","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/4235.585892"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2009.05.005"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.advengsoft.2012.11.011"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/CISE.2010.5676941"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.12785\/amis\/071L21"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ICTKE.2015.7368466"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2009.08.022"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2009.10.024"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1504\/IJICA.2015.073007"},{"key":"ref34","first-page":"179","article-title":"A Biomorphic Model for Automated Cloud Adaptation","author":"stoykov","year":"2016","journal-title":"Proc ? 2015 IEEE\/ACM 8th Int Conf Util Cloud Comput UCC 2015"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1016\/j.ecolmodel.2010.09.012"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1016\/j.anbehav.2012.01.008"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/CCDC.2009.5192603"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2007.4424657"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.010413.00175"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74626-3_17"},{"journal-title":"Malicious Mobile Code Virus Protection for Windows","year":"2001","author":"grimes","key":"ref27"},{"key":"ref65","first-page":"60","article-title":"A novel architecture for self-propagating malicious software within cloud infrastructures. Cloud Computing and Big Data (CloudCom-Asia)","author":"benkhelifa","year":"0","journal-title":"2013 International Conference"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2012.05.003"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2847562"},{"key":"ref1","volume":"15","author":"jia","year":"2005","journal-title":"Distributed Network Systems From Concepts to Implementations"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.3844\/jcssp.2007.134.137"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1155\/2014\/172583"},{"key":"ref21","first-page":"75","article-title":"Breaking Transposition Cipher with Genetic Algorithm","volume":"79","author":"toemeh","year":"2015","journal-title":"Elektronoka Elektrotechnika"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"317","DOI":"10.1613\/jair.530","article-title":"AntNet: Distributed stigmergetic control for communications networks","author":"di caro","year":"1998","journal-title":"J Artif Intell Res"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2000.885506"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2004.47"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.aeue.2015.07.013"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.3593"},{"key":"ref51","article-title":"T SECURE DATA STORAGE IN CLOUD ENVIRONMENT USING FINGERPRINT","volume":"2","author":"govinda","year":"2013","journal-title":"Asian J Comput Sci Info Technol"},{"journal-title":"A Biomorphic model for automated cloud adaptation","year":"2015","author":"stoykov","key":"ref59"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1016\/j.parco.2003.12.008"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2009.03.036"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/ICENT.2010.5532096"},{"key":"ref55","first-page":"42","article-title":"Mission resilience in cloud computing: A biologically inspired approach","author":"carvalho","year":"2011","journal-title":"International Conference on Information Warfare and Security"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/SERVICES.2011.45"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/2179298.2179389"},{"key":"ref52","first-page":"168","article-title":"A scheme for the generation of strong cryptographic key pairs based on ICMetrics","author":"tahir","year":"2012","journal-title":"2012 International Conference for Internet Technology and Secured Transactions ICITST"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2008.07.005"},{"key":"ref11","first-page":"130","article-title":"A biologically inspired immune system for computers","author":"kephart","year":"1994","journal-title":"Artificial Life IV Proceedings of the Fourth International Workshop on the Synthesis and Simulation of Living Systems"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/GCC.2006.29"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/s11047-006-9026-4"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2002.1011541"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1023\/A:1026195112518"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2012.6256518"},{"key":"ref16","first-page":"1","article-title":"An overview of apoptosis for computer security","volume":"4","author":"saudi","year":"2008","journal-title":"Information Technology 2008 ITSim 2008 International Symposium"},{"key":"ref17","first-page":"1","article-title":"An Overview of Biologically Inspired Computing in Information Security","author":"hordijk","year":"2005","journal-title":"National Information Security Conference"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICBBE.2009.5162174"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1111\/j.0824-7935.2004.00244.x"},{"key":"ref4","first-page":"0","author":"gebhardt","year":"2010","journal-title":"Challenges for Inter Virtual Machine Communication"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICICT.2013.6732787"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1561\/2200000051"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2013.116"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2013.6758040"},{"journal-title":"Engineering Self-Organising Systems","year":"2011","author":"serugendo","key":"ref7"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/CyberSec.2012.6246090"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2008.12.015"},{"key":"ref46","first-page":"1","author":"cybenko","year":"2014","journal-title":"Adversarial and Uncertain Reasoning for Adaptive Cyber Defense Building the Scientific Foundation"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/2179298.2179389"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/SERVICES.2011.91"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.186"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.4038\/icter.v4i2.4674"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/BF02831798"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/2076444.2076449"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ICENT.2010.5532096"}],"event":{"name":"2017 IEEE 2nd International Workshops on Foundations and Applications of Self* Systems (FAS*W)","start":{"date-parts":[[2017,9,18]]},"location":"Tucson, AZ, USA","end":{"date-parts":[[2017,9,22]]}},"container-title":["2017 IEEE 2nd International Workshops on Foundations and Applications of Self* Systems (FAS*W)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8063634\/8064070\/08064146.pdf?arnumber=8064146","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,4]],"date-time":"2019-10-04T15:54:24Z","timestamp":1570204464000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8064146\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,9]]},"references-count":65,"URL":"https:\/\/doi.org\/10.1109\/fas-w.2017.170","relation":{},"subject":[],"published":{"date-parts":[[2017,9]]}}}