{"entities":{"Q869376":{"pageid":871224,"ns":120,"title":"Item:Q869376","lastrevid":64996362,"modified":"2026-04-11T23:37:25Z","type":"item","id":"Q869376","labels":{"en":{"language":"en","value":"Using the danger model of immune systems for distributed defense in modern data networks"}},"descriptions":{"en":{"language":"en","value":"scientific article; zbMATH DE number 5130302"}},"aliases":{},"claims":{"P31":[{"mainsnak":{"snaktype":"value","property":"P31","hash":"fd5912e4dab4b881a8eb0eb27e7893fef55176ad","datavalue":{"value":{"entity-type":"item","numeric-id":56887,"id":"Q56887"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q869376$85A9F5D1-F515-436B-8580-EF34AABA2021","rank":"normal"}],"P159":[{"mainsnak":{"snaktype":"value","property":"P159","hash":"ab82060072b4d19f4a30353dcf491d6338f7e883","datavalue":{"value":{"text":"Using the danger model of immune systems for distributed defense in modern data networks","language":"en"},"type":"monolingualtext"},"datatype":"monolingualtext"},"type":"statement","id":"Q869376$619ED19D-97D2-4DD0-A711-3F106EE229EC","rank":"normal"}],"P225":[{"mainsnak":{"snaktype":"value","property":"P225","hash":"63b9f5c7aaa0880462f1b3588f18158251dd6c23","datavalue":{"value":"1112.68009","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q869376$4C9C9EB6-7631-4FC7-AB01-9AC6644E2ECF","rank":"normal"}],"P16":[{"mainsnak":{"snaktype":"value","property":"P16","hash":"0a9bb5327289583afafb42fa56f5bae1e98773c7","datavalue":{"value":{"entity-type":"item","numeric-id":869375,"id":"Q869375"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q869376$C955D07A-5002-45F4-A913-35C577311086","rank":"normal"}],"P200":[{"mainsnak":{"snaktype":"value","property":"P200","hash":"ae5b6d2e589e4e15465d745ed9cba11a5a86e282","datavalue":{"value":{"entity-type":"item","numeric-id":551683,"id":"Q551683"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q869376$0354A8DF-2C72-493A-A27D-2BC427D2ADBD","rank":"normal"}],"P28":[{"mainsnak":{"snaktype":"value","property":"P28","hash":"3af4457e51d097fa27d84537ba93ffccbacd245f","datavalue":{"value":{"time":"+2007-03-02T00:00:00Z","timezone":0,"before":0,"after":0,"precision":11,"calendarmodel":"http://www.wikidata.org/entity/Q1985727"},"type":"time"},"datatype":"time"},"type":"statement","id":"Q869376$E5FF194A-5C19-42E5-8111-245960BD0283","rank":"normal"}],"P226":[{"mainsnak":{"snaktype":"value","property":"P226","hash":"ca8c16691e9ec83d46a3995338b09d48ac9660ac","datavalue":{"value":"68M10","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q869376$E71F4247-FA7C-4C22-8EB9-A601EA16306B","rank":"normal"}],"P1451":[{"mainsnak":{"snaktype":"value","property":"P1451","hash":"ac7327a2f42ec39dc6204eea1245eedd0d8f8c87","datavalue":{"value":"5130302","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q869376$6698683E-03AA-4F89-BB3F-226EE083B042","rank":"normal"}],"P1450":[{"mainsnak":{"snaktype":"value","property":"P1450","hash":"104371d7f1bcce137ec71b2b1b57c812be5970ff","datavalue":{"value":"malware","type":"string"},"datatype":"string"},"type":"statement","id":"Q869376$F086AEDB-9062-4FA7-B6CC-558F468DF6D8","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1450","hash":"4a0cca664ea468c4153aba4e5fa6f15536614c5d","datavalue":{"value":"worm","type":"string"},"datatype":"string"},"type":"statement","id":"Q869376$C537FFCF-C9BC-4C4B-924E-87220ED5E03B","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1450","hash":"fe008a03bedb803b3c98826c3daa9b657865e979","datavalue":{"value":"virus","type":"string"},"datatype":"string"},"type":"statement","id":"Q869376$CD2D19E8-E196-4D8A-AE04-29D1332D58CE","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1450","hash":"84c612e97d0bbc5f0fc0c1fc6c648d85c6d9bbe2","datavalue":{"value":"security","type":"string"},"datatype":"string"},"type":"statement","id":"Q869376$6E8D365F-41C1-4805-9787-1F7445EA4D62","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1450","hash":"4c13b15de8bed29cb27eef8f71b9a5d13206e711","datavalue":{"value":"pervasive computing","type":"string"},"datatype":"string"},"type":"statement","id":"Q869376$00CBA258-C9F2-4C99-BCBA-4A266DD1FAA9","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1450","hash":"3031f995ed845b22cac5ae3b3e57a877b874f398","datavalue":{"value":"artificial immune systems","type":"string"},"datatype":"string"},"type":"statement","id":"Q869376$0C78E410-85E0-40ED-8EE5-6FD397C11AF6","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1450","hash":"e7c7dae0345a6b1ac0e909c53e5ff9d08fad4f36","datavalue":{"value":"intrusion detection systems","type":"string"},"datatype":"string"},"type":"statement","id":"Q869376$B0C994DF-0221-46EA-AF86-56F46798BBE9","rank":"normal"}],"P1460":[{"mainsnak":{"snaktype":"value","property":"P1460","hash":"57f7fea50d2ce1b39b695c4a1313582eed405e38","datavalue":{"value":{"entity-type":"item","numeric-id":5976449,"id":"Q5976449"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q869376$392317F4-270F-4414-93DF-C1CD0C24718D","rank":"normal"}],"P205":[{"mainsnak":{"snaktype":"value","property":"P205","hash":"0d5372b7d146d58da21d29345dc8e293787ce399","datavalue":{"value":"https://doi.org/10.1016/j.comnet.2006.09.015","type":"string"},"datatype":"url"},"type":"statement","id":"Q869376$73BBDB99-1CE9-450C-8755-83072695CC1D","rank":"normal"}],"P388":[{"mainsnak":{"snaktype":"value","property":"P388","hash":"e6b3b9e24c6c04e8ce8bb5cec97896eb9682579a","datavalue":{"value":"W1983012811","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q869376$D4E4B6C5-A848-49CA-A053-E8E97ED00E57","rank":"normal"}],"P27":[{"mainsnak":{"snaktype":"value","property":"P27","hash":"2eaa6f581b6bedb703c2bbc3146a577a2444d453","datavalue":{"value":"10.1016/J.COMNET.2006.09.015","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q869376$7BD871A8-C399-48D7-949D-17C336FF658F","rank":"normal"}],"P1643":[{"mainsnak":{"snaktype":"value","property":"P1643","hash":"7a75fd56dc8fc97fdbdeff899749d500b4ee9180","datavalue":{"value":{"entity-type":"item","numeric-id":4427277,"id":"Q4427277"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","qualifiers":{"P1659":[{"snaktype":"value","property":"P1659","hash":"1a77f0a7c6d71f6c52d88f8f38d06e54672fabc2","datavalue":{"value":{"amount":"+0.6827104091644287","unit":"1"},"type":"quantity"},"datatype":"quantity"}],"P1660":[{"snaktype":"value","property":"P1660","hash":"a327a09ea0305e98d5cf33bd4036320e19f2aed0","datavalue":{"value":{"entity-type":"item","numeric-id":6821328,"id":"Q6821328"},"type":"wikibase-entityid"},"datatype":"wikibase-item"}]},"qualifiers-order":["P1659","P1660"],"id":"Q869376$A7E78483-7F3C-4B7F-A671-C567D882B0B7","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1643","hash":"90ac32f30a783b824b78b270ed51f8a715bc8648","datavalue":{"value":{"entity-type":"item","numeric-id":4450885,"id":"Q4450885"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","qualifiers":{"P1659":[{"snaktype":"value","property":"P1659","hash":"eca1f4c86120868d4e8a5a4896397fd0b2db2bea","datavalue":{"value":{"amount":"+0.6825882196426392","unit":"1"},"type":"quantity"},"datatype":"quantity"}],"P1660":[{"snaktype":"value","property":"P1660","hash":"a327a09ea0305e98d5cf33bd4036320e19f2aed0","datavalue":{"value":{"entity-type":"item","numeric-id":6821328,"id":"Q6821328"},"type":"wikibase-entityid"},"datatype":"wikibase-item"}]},"qualifiers-order":["P1659","P1660"],"id":"Q869376$3B016D47-9687-4F67-B713-1DECE6599FAF","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1643","hash":"7a9f74e1fc2fbab17a3d4eddd0d88ba0d051fe02","datavalue":{"value":{"entity-type":"item","numeric-id":927441,"id":"Q927441"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","qualifiers":{"P1659":[{"snaktype":"value","property":"P1659","hash":"9b6765400b44d80def62db446def8964896fcb80","datavalue":{"value":{"amount":"+0.676487386226654","unit":"1"},"type":"quantity"},"datatype":"quantity"}],"P1660":[{"snaktype":"value","property":"P1660","hash":"a327a09ea0305e98d5cf33bd4036320e19f2aed0","datavalue":{"value":{"entity-type":"item","numeric-id":6821328,"id":"Q6821328"},"type":"wikibase-entityid"},"datatype":"wikibase-item"}]},"qualifiers-order":["P1659","P1660"],"id":"Q869376$ED1B5566-8B58-411F-8181-97650FC5C1D4","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1643","hash":"250a0193b638a293a7789bccb1ed41f5b018cea6","datavalue":{"value":{"entity-type":"item","numeric-id":1661452,"id":"Q1661452"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","qualifiers":{"P1659":[{"snaktype":"value","property":"P1659","hash":"833244fb984d89e36bec05680f38c9baf09c9024","datavalue":{"value":{"amount":"+0.671523928642273","unit":"1"},"type":"quantity"},"datatype":"quantity"}],"P1660":[{"snaktype":"value","property":"P1660","hash":"a327a09ea0305e98d5cf33bd4036320e19f2aed0","datavalue":{"value":{"entity-type":"item","numeric-id":6821328,"id":"Q6821328"},"type":"wikibase-entityid"},"datatype":"wikibase-item"}]},"qualifiers-order":["P1659","P1660"],"id":"Q869376$D35F77CF-F0A8-4734-B7B3-414F0AAF9C23","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1643","hash":"db89d72100c77ee63956868bd2771f1c5d1c7615","datavalue":{"value":{"entity-type":"item","numeric-id":3615994,"id":"Q3615994"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","qualifiers":{"P1659":[{"snaktype":"value","property":"P1659","hash":"e661142713305b953e4403fcee57cb878c336ba6","datavalue":{"value":{"amount":"+0.6651721596717834","unit":"1"},"type":"quantity"},"datatype":"quantity"}],"P1660":[{"snaktype":"value","property":"P1660","hash":"a327a09ea0305e98d5cf33bd4036320e19f2aed0","datavalue":{"value":{"entity-type":"item","numeric-id":6821328,"id":"Q6821328"},"type":"wikibase-entityid"},"datatype":"wikibase-item"}]},"qualifiers-order":["P1659","P1660"],"id":"Q869376$6BFA829C-1190-4968-BDE4-6DE939FD7B56","rank":"normal"}]},"sitelinks":{"mardi":{"site":"mardi","title":"Using the danger model of immune systems for distributed defense in modern data networks","badges":[],"url":"https://portal.mardi4nfdi.de/wiki/Using_the_danger_model_of_immune_systems_for_distributed_defense_in_modern_data_networks"}}}}}