BibTeX record: conf/sera/ZhangWX09a

download as .bib file

@inproceedings{DBLP:conf/sera/ZhangWX09a,
  author    = {Yu Zhang and
               Lihua Wu and
               Feng Xia},
  title     = {A Novel MHC-Inspired Approach for Malicious Code Detection},
  booktitle = {Software Engineering Research, Management and Applications 2009 [selected
               papers from the 7th {ACIS} International Conference on Software Engineering
               Research, Management and Applications, {SERA} 2009, Haikou, China,
               December 2-4, 2009]},
  year      = {2009},
  pages     = {293--304},
  crossref  = {DBLP:conf/sera/2009s},
  url       = {http://dx.doi.org/10.1007/978-3-642-05441-9_25},
  doi       = {10.1007/978-3-642-05441-9_25},
  timestamp = {Thu, 02 Oct 2014 02:37:46 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/sera/ZhangWX09a},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/sera/2009s,
  editor    = {Roger Y. Lee and
               Naohiro Ishii},
  title     = {Software Engineering Research, Management and Applications 2009 [selected
               papers from the 7th {ACIS} International Conference on Software Engineering
               Research, Management and Applications, {SERA} 2009, Haikou, China,
               December 2-4, 2009]},
  series    = {Studies in Computational Intelligence},
  year      = {2009},
  volume    = {253},
  publisher = {Springer},
  url       = {http://dx.doi.org/10.1007/978-3-642-05441-9},
  doi       = {10.1007/978-3-642-05441-9},
  isbn      = {978-3-642-05440-2},
  timestamp = {Thu, 02 Oct 2014 02:37:46 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/sera/2009s},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}