{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T00:26:41Z","timestamp":1769732801140,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540377498","type":"print"},{"value":"9783540377511","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11823940_30","type":"book-chapter","created":{"date-parts":[[2006,9,6]],"date-time":"2006-09-06T13:54:55Z","timestamp":1157550895000},"page":"390-403","source":"Crossref","is-referenced-by-count":36,"title":["Danger Is Ubiquitous: Detecting Malicious Activities in Sensor Networks Using the Dendritic Cell Algorithm"],"prefix":"10.1007","author":[{"given":"Jungwon","family":"Kim","sequence":"first","affiliation":[]},{"given":"Peter","family":"Bentley","sequence":"additional","affiliation":[]},{"given":"Christian","family":"Wallenta","sequence":"additional","affiliation":[]},{"given":"Mohamed","family":"Ahmed","sequence":"additional","affiliation":[]},{"given":"Stephen","family":"Hailes","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"30_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1007\/978-3-540-45192-1_15","volume-title":"Artificial Immune Systems","author":"U. Aickelin","year":"2003","unstructured":"Aickelin, U., Bentley, P.J., Cayzer, S., Kim, J., McLeod, J.: Danger Theory: The Link between AIS and IDS? In: Timmis, J., Bentley, P.J., Hart, E. (eds.) ICARIS 2003. LNCS, vol.\u00a02787, pp. 147\u2013155. Springer, Heidelberg (2003)"},{"key":"30_CR2","doi-asserted-by":"crossref","unstructured":"Akyildiz, I.F., et al.: A Survey on Sensor Networks. IEEE Communication Magazine, 102\u2013114 (August 2002)","DOI":"10.1109\/MCOM.2002.1024422"},{"key":"30_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1007\/11536444_11","volume-title":"Artificial Immune Systems","author":"P.J. Bentley","year":"2005","unstructured":"Bentley, P.J., Greensmith, J., Ujjin, S.: Two ways to grow tissue for artificial immune systems. In: Jacob, C., Pilat, M.L., Bentley, P.J., Timmis, J.I. (eds.) ICARIS 2005. LNCS, vol.\u00a03627, pp. 139\u2013152. Springer, Heidelberg (2005)"},{"key":"30_CR4","doi-asserted-by":"crossref","unstructured":"Estrin, D., Cullar, D., Pister, K., Sukhatme, G.: Connecting the Physical World with Pervasive Networks. In: Pervasive Computing, pp. 59\u201369 (2002)","DOI":"10.1109\/MPRV.2002.993145"},{"key":"30_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1007\/11536444_12","volume-title":"Artificial Immune Systems","author":"J. Greensmith","year":"2005","unstructured":"Greensmith, J., Aickelin, U., Cayzer, S.: Introducing Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomaly Detection. In: Jacob, C., Pilat, M.L., Bentley, P.J., Timmis, J.I. (eds.) ICARIS 2005. LNCS, vol.\u00a03627, pp. 153\u2013167. Springer, Heidelberg (2005)"},{"key":"30_CR6","doi-asserted-by":"crossref","unstructured":"Greensmith, J., Twycross, J., Aickelin, U.: Dendritic Cells for Anomaly Detection. In: Proc. of IEEE Cong. on Evolutionary Computation (CEC 2006), Vancouver, Canada (2006)","DOI":"10.1109\/CEC.2006.1688374"},{"key":"30_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"404","DOI":"10.1007\/11823940_31","volume-title":"Artificial Immune Systems","author":"J. Greensmith","year":"2006","unstructured":"Greensmith, J., Aickelin, U., Twycross, J.: Articulation and clarification of the dendritic cell algorithm. In: Bersini, H., Carneiro, J. (eds.) ICARIS 2006. LNCS, vol.\u00a04163, pp. 404\u2013417. Springer, Heidelberg (2006)"},{"key":"30_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"483","DOI":"10.1007\/11536444_37","volume-title":"Artificial Immune Systems","author":"E. Hart","year":"2005","unstructured":"Hart, E., Timmis, J.I.: Application Areas of AIS: The Past, The Present and The Future. In: Jacob, C., Pilat, M.L., Bentley, P.J., Timmis, J.I. (eds.) ICARIS 2005. LNCS, vol.\u00a03627, pp. 483\u2013497. Springer, Heidelberg (2005)"},{"issue":"1","key":"30_CR9","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1109\/TNET.2002.808417","volume":"11","author":"C. Intanagonwiwat","year":"2003","unstructured":"Intanagonwiwat, C., et al.: Directed Diffusion for Wireless Sensor Networking. IEEE\/ACM Trans. on Networking\u00a011(1), 2\u201316 (2003)","journal-title":"IEEE\/ACM Trans. on Networking"},{"key":"30_CR10","doi-asserted-by":"crossref","unstructured":"Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: attacks and countermeasures. Ad Hoc Networks, 293\u2013315 (2004)","DOI":"10.1016\/S1570-8705(03)00008-8"},{"key":"30_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"168","DOI":"10.1007\/11536444_13","volume-title":"Artificial Immune Systems","author":"J. Kim","year":"2005","unstructured":"Kim, J., Wilson, W.O., Aickelin, U., McLeod, J.: Cooperative Automated Worm Response and Detection ImmuNe ALgorithm(CARDINAL) Inspired by T-Cell Immunity and Tolerance. In: Jacob, C., Pilat, M.L., Bentley, P.J., Timmis, J.I. (eds.) ICARIS 2005. LNCS, vol.\u00a03627, pp. 168\u2013181. Springer, Heidelberg (2005)"},{"key":"30_CR12","unstructured":"Kim, J., et al.: Immune System Approaches to Intrusion Detection \u2013 a Review, under review"},{"key":"30_CR13","doi-asserted-by":"publisher","first-page":"991","DOI":"10.1146\/annurev.iy.12.040194.005015","volume":"12","author":"P. Matzinger","year":"1994","unstructured":"Matzinger, P.: Tolerance, danger and the extended family. Annual Reviews in Immunology\u00a012, 991\u20131045 (1994)","journal-title":"Annual Reviews in Immunology"},{"key":"30_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"342","DOI":"10.1007\/978-3-540-30220-9_28","volume-title":"Proc. of the 2rd Int. Conf. on AIS (ICARIS)","author":"S. Sarafijanovic","year":"2004","unstructured":"Sarafijanovic, S., Le Boudec, J.: An AIS for misbehaviour detection in mobile ad-hoc networks with virtual thymus, clustering, danger signals and memory detectors. In: Proc. of the 2rd Int. Conf. on AIS (ICARIS). LNCS, pp. 342\u2013356. Springer, Heidelberg (2004)"},{"key":"30_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1007\/11536444_9","volume-title":"Artificial Immune Systems","author":"J. Twycross","year":"2005","unstructured":"Twycross, J., Aickelin, U.: Towards a conceptual framework for innate immunity. In: Jacob, C., Pilat, M.L., Bentley, P.J., Timmis, J.I. (eds.) ICARIS 2005. LNCS, vol.\u00a03627, pp. 112\u2013125. Springer, Heidelberg (2005)"},{"key":"30_CR16","doi-asserted-by":"crossref","unstructured":"Twycross, J., Aickelin, U.: Libtissue \u2013 implementing innate immunity. In: Proc. of the CEC 2006, Vancouver, Canada (to appear, 2006)","DOI":"10.1109\/CEC.2006.1688351"}],"container-title":["Lecture Notes in Computer Science","Artificial Immune Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11823940_30.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T20:17:32Z","timestamp":1605644252000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11823940_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540377498","9783540377511"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/11823940_30","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2006]]}}}