{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T07:35:15Z","timestamp":1729668915436,"version":"3.28.0"},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/ipdps.2005.406","type":"proceedings-article","created":{"date-parts":[[2005,4,19]],"date-time":"2005-04-19T19:05:35Z","timestamp":1113937535000},"page":"188b-188b","source":"Crossref","is-referenced-by-count":2,"title":["Some Issues in Solving the Anomaly Detection Problem using Immunological Approach"],"prefix":"10.1109","author":[{"given":"F.","family":"Seredynski","sequence":"first","affiliation":[]},{"given":"P.","family":"Bouvry","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Detection Intruders in Computer Networks Using Immune System","year":"2004","author":"rutkowski","key":"19"},{"key":"17","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-02830-8","author":"michalewicz","year":"1992","journal-title":"Genetic Algorithms + Data Structures = Evolution Programs"},{"key":"18","article-title":"Snort - Lighweight intrusion detection for networks","author":"roesch","year":"1999","journal-title":"Proc LISA 99 13th Systems Administration Conf"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/312129.312212"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2004.1330898"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/ICEC.1998.699852"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1162\/106365600568257"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1162\/evco.1993.1.3.191"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2002.1011540"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2002.1011539"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2004.1330979"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1007\/1-4020-8143-X_16"},{"key":"1","article-title":"PNRule: A new framework for learning classifier models in data mining a case study in network intrusion detection","volume":"rc 21719","author":"agrawal","year":"2000","journal-title":"Technical Report"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1016\/0167-2789(86)90240-X"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2002.1011541"},{"journal-title":"Artificial Immune Systems and Their Applications","year":"1999","key":"6"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/ICSMC.1998.726682"},{"journal-title":"DARPA Intrusion Detection Evaluation","year":"1999","key":"4"},{"key":"9","first-page":"255","article-title":"Anomaly detection over noisy data using learned probability distributions","author":"eskin","year":"2000","journal-title":"Proc 15th Int Conf Machine Learning"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2004.1330845"}],"event":{"name":"19th IEEE International Parallel and Distributed Processing Symposium","location":"Denver, CO, USA"},"container-title":["19th IEEE International Parallel and Distributed Processing Symposium"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/9722\/30685\/01420075.pdf?arnumber=1420075","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,2,14]],"date-time":"2019-02-14T14:40:05Z","timestamp":1550155205000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1420075\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/ipdps.2005.406","relation":{},"subject":[]}}