{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T08:04:58Z","timestamp":1771661098390,"version":"3.50.1"},"publisher-location":"Cham","reference-count":38,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030801281","type":"print"},{"value":"9783030801298","type":"electronic"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-80129-8_47","type":"book-chapter","created":{"date-parts":[[2021,7,5]],"date-time":"2021-07-05T09:04:22Z","timestamp":1625475862000},"page":"664-680","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Incremental Dendritic Cell Algorithm for Intrusion Detection in Cyber-Physical Production Systems"],"prefix":"10.1007","author":[{"given":"Rui","family":"Pinto","sequence":"first","affiliation":[]},{"given":"Gil","family":"Gon\u00e7alves","sequence":"additional","affiliation":[]},{"given":"Jerker","family":"Delsing","sequence":"additional","affiliation":[]},{"given":"Eduardo","family":"Tovar","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"47_CR1","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1016\/j.neucom.2017.04.070","volume":"262","author":"S Ahmad","year":"2017","unstructured":"Ahmad, S., Lavin, A., Purdy, S., Agha, Z.: Unsupervised real-time anomaly detection for streaming data. Neurocomputing 262, 134\u2013147 (2017)","journal-title":"Neurocomputing"},{"key":"47_CR2","unstructured":"Aickelin, U., Cayzer, S.: The danger theory and its application to artificial immune systems. arXiv preprint arXiv:0801.3549 (2008)"},{"key":"47_CR3","doi-asserted-by":"crossref","unstructured":"Ashraf, Q.M., Habaebi, M.H.: Autonomic schemes for threat mitigation in internet of things. J. Netw. Comput. Appl. 49, 112\u2013127 (2015)","DOI":"10.1016\/j.jnca.2014.11.011"},{"key":"47_CR4","unstructured":"Baker, G.H., Berg, A.: Supervisory control and data acquisition (SCADA) systems. Crit. Infrastr. Protect. Rep. 1(6) (2002)"},{"key":"47_CR5","doi-asserted-by":"crossref","unstructured":"Bay, S.D., Kibler, D., Pazzani, M.J., Smyth, P.: The UCI KDD archive of large data sets for data mining research and experimentation. ACM SIGKDD Explor. Newsl. 2(2), 81\u201385 (2000)","DOI":"10.1145\/380995.381030"},{"key":"47_CR6","unstructured":"Bennaoui, A., Hachemani, R., Kouninef, B.: Immune-inspired algorithm for network intrusion detection"},{"key":"47_CR7","unstructured":"Bhuyan, M.H., Bhattacharyya, D.K., Kalita, J.K.: Survey on incremental approaches for network anomaly detection. arXiv preprint arXiv:1211.4493 (2012)"},{"key":"47_CR8","doi-asserted-by":"publisher","unstructured":"Burbeck, K., Nadjm-Tehrani, S.: Adwice\u2013anomaly detection with real-time incremental clustering. In: International Conference on Information Security and Cryptology, pp. 407\u2013424. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/11496618_30","DOI":"10.1007\/11496618_30"},{"key":"47_CR9","doi-asserted-by":"crossref","unstructured":"Burbeck, K., Nadjm-Tehrani, S.: Adaptive real-time anomaly detection with incremental clustering. Inf. Secur. Tech. Rep. 12(1), 56\u201367 (2007)","DOI":"10.1016\/j.istr.2007.02.004"},{"issue":"3","key":"47_CR10","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1145\/1541880.1541882","volume":"41","author":"V Chandola","year":"2009","unstructured":"Chandola, V., Banerjee, A., Kumar, V.: Anomaly detection: a survey. ACM Comput. Surv. (CSUR) 41(3), 15 (2009)","journal-title":"ACM Comput. Surv. (CSUR)"},{"issue":"3","key":"47_CR11","doi-asserted-by":"publisher","first-page":"505","DOI":"10.1007\/s10115-015-0891-y","volume":"48","author":"Z Chelly","year":"2016","unstructured":"Chelly, Z., Elouedi, Z.: A survey of the dendritic cell algorithm. Knowl. Inf. Syst. 48(3), 505\u2013535 (2016)","journal-title":"Knowl. Inf. Syst."},{"key":"47_CR12","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1016\/j.engappai.2016.01.020","volume":"51","author":"M-H Chen","year":"2016","unstructured":"Chen, M.-H., Chang, P.-C., Jheng-Long, W.: A population-based incremental learning approach with artificial immune system for network intrusion detection. Eng. Appl. Artif. Intell. 51, 171\u2013181 (2016)","journal-title":"Eng. Appl. Artif. Intell."},{"issue":"2","key":"47_CR13","doi-asserted-by":"publisher","first-page":"1574","DOI":"10.1016\/j.asoc.2010.08.024","volume":"11","author":"D Dasgupta","year":"2011","unstructured":"Dasgupta, D., Senhua, Yu., Nino, F.: Recent advances in artificial immune systems: models and applications. Appl. Soft Comput. 11(2), 1574\u20131587 (2011)","journal-title":"Appl. Soft Comput."},{"key":"47_CR14","unstructured":"Gepperth, A., Hammer, B.: Incremental learning algorithms and applications (2016)"},{"key":"47_CR15","doi-asserted-by":"crossref","unstructured":"Ghosh, D., Sharman, R., Rao, H.R., Upadhyaya, S.: Self-healing systems\u2013survey and synthesis. Decis. Support Syst. 42(4), 2164\u20132185 (2007)","DOI":"10.1016\/j.dss.2006.06.011"},{"key":"47_CR16","doi-asserted-by":"crossref","unstructured":"Greensmith, J.: The dendritic cell algorithm. Ph.D. thesis, Citeseer (2007)","DOI":"10.2139\/ssrn.2831280"},{"key":"47_CR17","doi-asserted-by":"publisher","unstructured":"Greensmith, J., Aickelin, U.: The deterministic dendritic cell algorithm. In: International Conference on Artificial Immune Systems, pp. 291\u2013302. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-85072-4_26","DOI":"10.1007\/978-3-540-85072-4_26"},{"key":"47_CR18","unstructured":"Gu, F.: Theoretical and empirical extensions of the dendritic cell algorithm. Ph.D. thesis, University of Nottingham (2011)"},{"key":"47_CR19","doi-asserted-by":"publisher","unstructured":"Gu, F., Greensmith, J., Aickelin, U.: Further exploration of the dendritic cell algorithm: antigen multiplier and time windows. In: International Conference on Artificial Immune Systems, pp. 142\u2013153. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-85072-4_26","DOI":"10.1007\/978-3-540-85072-4_26"},{"key":"47_CR20","unstructured":"Halford, M., Bolmier, G., Sourty, R., Vaysse, R., Zouitine, A.: Creme, a Python library for online machine learning (2019)"},{"issue":"4","key":"47_CR21","doi-asserted-by":"publisher","first-page":"1052","DOI":"10.1109\/JSYST.2013.2257594","volume":"8","author":"S Han","year":"2014","unstructured":"Han, S., Xie, M., Chen, H.-H., Ling, Y.: Intrusion detection in cyber-physical systems: techniques and challenges. IEEE Syst. J. 8(4), 1052\u20131062 (2014)","journal-title":"IEEE Syst. J."},{"key":"47_CR22","unstructured":"IBM: Autonomic Computing: IBM\u2019s Perspective on the State of Information Technology, October 2001. http:\/\/people.scs.carleton.ca\/~soma\/biosec\/readings\/autonomic_computing.pdf"},{"key":"47_CR23","doi-asserted-by":"crossref","unstructured":"Igbe, O., Darwish, I., Saadawi, T.: Deterministic dendritic cell algorithm application to smart grid cyber-attack detection. In: 2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud), pp. 199\u2013204. IEEE (2017)","DOI":"10.1109\/CSCloud.2017.12"},{"key":"47_CR24","doi-asserted-by":"crossref","unstructured":"Jing, Q., Vasilakos, A.V., Wan, J., Lu, J., Qiu, D.: Security of the internet of things: perspectives and challenges. Wirel. Netw. 20(8), 2481\u20132501 (2014)","DOI":"10.1007\/s11276-014-0761-7"},{"key":"47_CR25","doi-asserted-by":"crossref","unstructured":"Khreich, W., Granger, E., Miri, A., Sabourin, R.: A comparison of techniques for on-line incremental learning of hmm parameters in anomaly detection. In: 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, pp. 1\u20138. IEEE (2009)","DOI":"10.1109\/CISDA.2009.5356542"},{"key":"47_CR26","unstructured":"Koopman, P.: Elements of the self-healing system problem space. J. Reliabil. Qual. Saf. Eng. 8 (2003)"},{"key":"47_CR27","unstructured":"Laskov, P., Gehl, C., Kr\u00fcger, S., M\u00fcller, K.-R.: Incremental support vector learning: analysis, implementation and applications. J. Mach. Learn. Res. 7(Sep), 1909\u20131936 (2006)"},{"key":"47_CR28","doi-asserted-by":"crossref","unstructured":"Lavin, A., Ahmad, S.: Evaluating real-time anomaly detection algorithms\u2013the numenta anomaly benchmark. In: 2015 IEEE 14th International Conference on Machine Learning and Applications (ICMLA), pp. 38\u201344. IEEE (2015)","DOI":"10.1109\/ICMLA.2015.141"},{"key":"47_CR29","unstructured":"Lemos, R.: SCADA system makers pushed toward security. July 2006. http:\/\/www.securityfocus.com\/news\/11402"},{"key":"47_CR30","doi-asserted-by":"crossref","unstructured":"Pinto, R., Gon\u00e7alves, G., Tovar, E., Delsing, J.: Attack detection in cyber-physical production systems using the deterministic dendritic cell algorithm. In: 2020 25th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA), vol. 1, pp. 1552\u20131559 (2020)","DOI":"10.1109\/ETFA46521.2020.9212021"},{"key":"47_CR31","unstructured":"Pinto, R.: M2M using OPC UA (2020)"},{"key":"47_CR32","unstructured":"Rodosek, G.D., Geihs, K., Schmeck, H., Stiller, B.: Self-healing systems: foundations and challenges. In: Self-Healing and Self-Adaptive Systems, no. 09201 (2009)"},{"key":"47_CR33","doi-asserted-by":"crossref","unstructured":"Sicari, S., Rizzardi, A., Grieco, L.A., Coen-Porisini, A.:Security, privacy and trust in internet of things: the road ahead. Comput. Netw. 76, 146\u2013164 (2015)","DOI":"10.1016\/j.comnet.2014.11.008"},{"key":"47_CR34","doi-asserted-by":"crossref","unstructured":"Stehman, S.V.: Selecting and interpreting measures of thematic classification accuracy. Remote Sens. Environ. 62(1), 77\u201389 (1997)","DOI":"10.1016\/S0034-4257(97)00083-7"},{"key":"47_CR35","doi-asserted-by":"crossref","unstructured":"Tavallaee, M., Bagheri, E., Lu, W., Ghorbani, A.A.: A detailed analysis of the KDD Cup 99 data set. In: 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, pp. 1\u20136. IEEE (2009)","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"47_CR36","unstructured":"Tsang, R.: Cyberthreats, vulnerabilities and attacks on scada networks. In: Working Paper. University of California, Berkeley (2010). http:\/\/gspp.berkeley.edu\/iths\/Tsang_SCADA%20Attacks.pdf. Accessed 28 Dec 2011"},{"issue":"6","key":"47_CR37","doi-asserted-by":"publisher","first-page":"7698","DOI":"10.1016\/j.eswa.2010.12.141","volume":"38","author":"Y Yi","year":"2011","unstructured":"Yi, Y., Jiansheng, W., Wei, X.: Incremental SVM based on reserved set for network intrusion detection. Expert Syst. Appl. 38(6), 7698\u20137707 (2011)","journal-title":"Expert Syst. Appl."},{"key":"47_CR38","doi-asserted-by":"crossref","unstructured":"Zhong, C., Li, N.: Incremental clustering algorithm for intrusion detection using clonal selection. In: 2008 IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial Application, vol. 1, pp. 326\u2013331. IEEE (2008)","DOI":"10.1109\/PACIIA.2008.256"}],"container-title":["Lecture Notes in Networks and Systems","Intelligent Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-80129-8_47","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T07:14:37Z","timestamp":1771658077000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-80129-8_47"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030801281","9783030801298"],"references-count":38,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-80129-8_47","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"value":"2367-3370","type":"print"},{"value":"2367-3389","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"6 July 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}