{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,3,14]],"date-time":"2024-03-14T08:42:56Z","timestamp":1710405776317},"reference-count":17,"publisher":"Springer Science and Business Media LLC","issue":"5","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IJCIS"],"DOI":"10.1080\/18756891.2012.733205","type":"journal-article","created":{"date-parts":[[2013,5,2]],"date-time":"2013-05-02T23:00:55Z","timestamp":1367535655000},"page":"808","source":"Crossref","is-referenced-by-count":3,"title":["An Immune-inspired Adaptive Automated Intrusion Response System Model"],"prefix":"10.1007","volume":"5","author":[{"given":"Ling-xi","family":"Peng","sequence":"first","affiliation":[]},{"given":"Dong-qing","family":"Xie","sequence":"first","affiliation":[]},{"given":"Ying","family":"Gao","sequence":"first","affiliation":[]},{"given":"Wen-bin","family":"Chen","sequence":"first","affiliation":[]},{"given":"Fu-fang","family":"Li","sequence":"first","affiliation":[]},{"given":"Wu","family":"Wen","sequence":"first","affiliation":[]},{"given":"Jue","family":"Wu","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012]]},"reference":[{"issue":"3","key":"CIT0001","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1109\/32.372146","volume":"21","author":"Ilgun K.","year":"1995","journal-title":"IEEE T. Softw. Eng."},{"issue":"3","key":"CIT0002","first-page":"109","volume":"31","author":"Duan X.T.","year":"2010","journal-title":"J. Commu."},{"key":"CIT0003","volume-title":"Intrusion Damage Control and Assessment: A Taxonomy and Implementation of Automated Responses to Intrusive Behavior","author":"Fisch E A.","year":"1996"},{"key":"CIT0004","unstructured":"A. C . Curtsi , A Methodology for Using Intelligent Agents to provide Automated Intrusion Response , Proc. of the IEEE Systems, Man, and Cybernetics Information Assurance and Security Workshop New York , USA , 2000 , pp. 110 \u2013 116 ."},{"issue":"1","key":"CIT0005","first-page":"5","volume":"10","author":"Wenke L.","year":"2002","journal-title":"J. Comp. Secur."},{"issue":"5","key":"CIT0006","doi-asserted-by":"crossref","first-page":"1334","DOI":"10.1016\/j.comnet.2006.09.006","volume":"51","author":"Wu Y.S.","year":"2007","journal-title":"Comput. Networks."},{"issue":"3","key":"CIT0007","doi-asserted-by":"crossref","first-page":"2465","DOI":"10.1016\/j.eswa.2009.07.079","volume":"37","author":"Mu C. P.","year":"2010","journal-title":"Expert Syst. Appl."},{"issue":"3","key":"CIT0008","first-page":"280","volume":"3","author":"Cuppens-Boulahia N.","year":"2009","journal-title":"Int. J. Inf. Comp. Secur."},{"issue":"5","key":"CIT0009","first-page":"769","volume":"32","author":"Zhang J.","year":"2004","journal-title":"Acta Electr. Sin."},{"issue":"2","key":"CIT0010","first-page":"23","volume":"2","author":"Tan G.Z.","year":"2011","journal-title":"Int. J. Artif. Intell, Expert Syst."},{"issue":"11","key":"CIT0011","first-page":"2416","volume":"37","author":"Wu Y. R.","year":"2009","journal-title":"Acta Electr. Sin."},{"issue":"10","key":"CIT0012","doi-asserted-by":"crossref","first-page":"1475","DOI":"10.1007\/s11432-008-0125-y","volume":"51","author":"Li T.","year":"2008","journal-title":"Sci. China, Ser. F, Inf. Sci."},{"issue":"5","key":"CIT0013","first-page":"798","volume":"48","author":"Li T","year":"2005","journal-title":"Sci. China, Ser. F, Inf. Sci"},{"key":"CIT0014","doi-asserted-by":"crossref","volume-title":"Policy Tree Based Proactive Defense Model for Network Security","author":"Zhang F.","year":"2004","DOI":"10.1007\/978-3-540-30207-0_55"},{"issue":"3","key":"CIT0015","first-page":"43","volume":"24","author":"Wang L.","year":"2004","journal-title":"Comput. Appl."},{"issue":"4","key":"CIT0016","doi-asserted-by":"crossref","first-page":"410","DOI":"10.1080\/18756891.2011.9727800","volume":"4","author":"Chen W.","year":"2011","journal-title":"Int. J. Comput. Int. Sys."},{"issue":"1","key":"CIT0017","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1080\/18756891.2010.9727672","volume":"3","author":"Zhao X.C","year":"2010","journal-title":"Int. J. Comput. Int. Sys."}],"container-title":["International Journal of Computational Intelligence Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/18756891.2012.733205","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,10]],"date-time":"2021-12-10T11:12:43Z","timestamp":1639134763000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.atlantis-press.com\/article\/25868011"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2012]]},"references-count":17,"journal-issue":{"issue":"5","published-online":{"date-parts":[[2012]]}},"alternative-id":["25868011"],"URL":"http:\/\/dx.doi.org\/10.1080\/18756891.2012.733205","relation":{},"ISSN":["1875-6883"],"issn-type":[{"value":"1875-6883","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012]]}}}