{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,4]],"date-time":"2025-05-04T04:02:22Z","timestamp":1746331342190,"version":"3.40.4"},"publisher-location":"Cham","reference-count":36,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319076911"},{"type":"electronic","value":"9783319076928"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-07692-8_42","type":"book-chapter","created":{"date-parts":[[2014,5,29]],"date-time":"2014-05-29T16:19:57Z","timestamp":1401380397000},"page":"441-452","source":"Crossref","is-referenced-by-count":8,"title":["Comparative Performance Analysis of Negative Selection Algorithm with Immune and Classification Algorithms"],"prefix":"10.1007","author":[{"given":"Ayodele","family":"Lasisi","sequence":"first","affiliation":[]},{"given":"Rozaida","family":"Ghazali","sequence":"additional","affiliation":[]},{"given":"Tutut","family":"Herawan","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"42_CR1","doi-asserted-by":"crossref","unstructured":"Forrest, S., Perelson, A.S., Allen, L., Cherukuri, R.: Self-nonself discrimination in a computer. In: Proceedings of the 1994 IEEE Computer Society Symposium on Research in Security and Privacy, pp. 202\u2013212. IEEE (1994)","DOI":"10.1109\/RISP.1994.296580"},{"issue":"12","key":"42_CR2","doi-asserted-by":"publisher","first-page":"3448","DOI":"10.1016\/j.comnet.2007.02.001","volume":"51","author":"A. Patcha","year":"2007","unstructured":"Patcha, A., Park, J.M.: An overview of anomaly detection techniques: Existing solutions and latest technological trends. Computer Networks\u00a051(12), 3448\u20133470 (2007)","journal-title":"Computer Networks"},{"issue":"13","key":"42_CR3","doi-asserted-by":"publisher","first-page":"2649","DOI":"10.1016\/j.comcom.2007.03.008","volume":"30","author":"A. Boukerche","year":"2007","unstructured":"Boukerche, A., Machado, R.B., Juc\u00e1, K.R., Sobral, J.B.M., Notare, M.S.: An agent based and biological inspired real-time intrusion detection and security model for computer network operations. Computer Communications\u00a030(13), 2649\u20132660 (2007)","journal-title":"Computer Communications"},{"issue":"3","key":"42_CR4","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1109\/TEVC.2002.1011541","volume":"6","author":"D. Dasgupta","year":"2002","unstructured":"Dasgupta, D., Gonz\u00e1lez, F.: An immunity-based technique to characterize intrusions in computer networks. IEEE Transactions on Evolutionary Computation\u00a06(3), 281\u2013291 (2002)","journal-title":"IEEE Transactions on Evolutionary Computation"},{"issue":"3","key":"42_CR5","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1145\/1541880.1541882","volume":"41","author":"V. Chandola","year":"2009","unstructured":"Chandola, V., Banerjee, A., Kumar, V.: Anomaly detection: A survey. ACM Computing Surveys (CSUR)\u00a041(3), 15 (2009)","journal-title":"ACM Computing Surveys (CSUR)"},{"key":"42_CR6","unstructured":"Tamberi, F.: Anomaly detection (2007)"},{"issue":"143","key":"42_CR7","doi-asserted-by":"publisher","first-page":"364","DOI":"10.1080\/14786448708628471","volume":"23","author":"F. Edgeworth","year":"1887","unstructured":"Edgeworth, F.: On discordant observations. The London, Edinburgh, and Dublin Philosophical Magazine and Journal of Science\u00a023(143), 364\u2013375 (1887)","journal-title":"The London, Edinburgh, and Dublin Philosophical Magazine and Journal of Science"},{"key":"42_CR8","unstructured":"Vasarhelyi, M.A., Issa, H.: Application of anomaly detection techniques to identify fraudulent refunds (2011)"},{"issue":"5","key":"42_CR9","doi-asserted-by":"publisher","first-page":"631","DOI":"10.1109\/TKDE.2007.1009","volume":"19","author":"X. Song","year":"2007","unstructured":"Song, X., Wu, M., Jermaine, C., Ranka, S.: Conditional anomaly detection. IEEE Transactions on Knowledge and Data Engineering\u00a019(5), 631\u2013645 (2007)","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"issue":"11","key":"42_CR10","doi-asserted-by":"publisher","first-page":"1059","DOI":"10.1016\/j.peva.2010.08.018","volume":"67","author":"Y. Yao","year":"2010","unstructured":"Yao, Y., Sharma, A., Golubchik, L., Govindan, R.: Online anomaly detection for sensor systems: A simple and efficient approach. Performance Evaluation\u00a067(11), 1059\u20131075 (2010)","journal-title":"Performance Evaluation"},{"key":"42_CR11","unstructured":"Amer, M., Abdennadher, S.: Comparison of unsupervised anomaly detection techniques. PhD thesis, Bachelor\u2019s Thesis 2011 (2011), http:\/\/www.madm.eu\/_media\/theses\/thesis-amer.pdf"},{"key":"42_CR12","unstructured":"Kumar, R., Verma, R.: Classification algorithms for data mining: A survey. International Journal of Innovations in Engineering and Technology (IJIET) (2012)"},{"key":"42_CR13","unstructured":"Kilany, R.M.: Efficient classification and prediction algorithms for biomedical information (2013)"},{"key":"42_CR14","unstructured":"Weiss, S.M., Kulikowski, C.A.: Computer systems that learn: Classification and prediction methods from statistics, neural nets, machine learning and expert systems (1991)"},{"key":"42_CR15","doi-asserted-by":"crossref","unstructured":"Gonzalez, F., Dasgupta, D., Kozma, R.: Combining negative selection and classification techniques for anomaly detection. In: Proceedings of the 2002 Congress on Evolutionary Computation, CEC 2002, vol.\u00a01, pp. 705\u2013710. IEEE (2002)","DOI":"10.1109\/CEC.2002.1007012"},{"key":"42_CR16","unstructured":"Rao, K.H., Srinivas, G., Damodhar, A., Krishna, M.V.: Implementation of anomaly detection technique using machine learning algorithms. International Journal of Computer Science and Telecommunications, ISSN 2047\u20133338"},{"issue":"3364","key":"42_CR17","doi-asserted-by":"publisher","first-page":"1649","DOI":"10.1126\/science.129.3364.1649","volume":"129","author":"J. Lederberg","year":"1959","unstructured":"Lederberg, J.: Genes and antibodies do antigens bear instructions for antibody specificity or do they select cell lines that arise by mutation? Science\u00a0129(3364), 1649\u20131653 (1959)","journal-title":"Science"},{"key":"42_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1007\/978-3-642-33757-4_3","volume-title":"Artificial Immune Systems","author":"J. Textor","year":"2012","unstructured":"Textor, J.: A comparative study of negative selection based anomaly detection in sequence data. In: Coello Coello, C.A., Greensmith, J., Krasnogor, N., Li\u00f2, P., Nicosia, G., Pavone, M. (eds.) ICARIS 2012. LNCS, vol.\u00a07597, pp. 28\u201341. Springer, Heidelberg (2012)"},{"key":"42_CR19","series-title":"LNEE","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1007\/978-981-4585-18-7_20","volume-title":"Proceedings of the First International Conference on Advanced Data and Information Engineering (DaEng 2013)","author":"A. Lasisi","year":"2014","unstructured":"Lasisi, A., Ghazali, R., Herawan, T.: Negative selection algorithm: A survey on the epistemology of generating detectors. In: Herawan, T., Deris, M.M., Abawajy, J. (eds.) Proceedings of the First International Conference on Advanced Data and Information Engineering (DaEng 2013). LNEE, vol.\u00a0285, pp. 167\u2013176. Springer, Heidelberg (2014)"},{"issue":"4","key":"42_CR20","doi-asserted-by":"publisher","first-page":"443","DOI":"10.1162\/106365600568257","volume":"8","author":"S.A. Hofmeyr","year":"2000","unstructured":"Hofmeyr, S.A., Forrest, S.: Architecture for an artificial immune system. Evolutionary Computation\u00a08(4), 443\u2013473 (2000)","journal-title":"Evolutionary Computation"},{"key":"42_CR21","doi-asserted-by":"crossref","unstructured":"Stibor, T., Timmis, J., Eckert, C.: The link between r-contiguous detectors and k-cnf satisfiability. In: IEEE Congress on Evolutionary Computation, CEC 2006, pp. 491\u2013498. IEEE (2006)","DOI":"10.1109\/CEC.2006.1688350"},{"key":"42_CR22","unstructured":"D\u2019Haeseleer, P., Forrest, S., et al.: An immunological approach to change detection. In: Proc. of IEEE Symposium on Research in Security and Privacy, Oakland, CA (1996)"},{"key":"42_CR23","unstructured":"Majd, Mahshid, A.H., Hashemi, S.: A polymorphic convex hull scheme for negative selection algorithms. International Journal of Innovative Computing, Information and Control\u00a08(5A), 2953\u20132964 (2012)"},{"key":"42_CR24","doi-asserted-by":"crossref","unstructured":"D\u2019Haeseleer, P., Forrest, S., Helman, P.: An immunological approach to change detection: Algorithms, analysis and implications. In: Proceedings of the 1996 IEEE Symposium on Security and Privacy, pp. 110\u2013119. IEEE (1996)","DOI":"10.1109\/SECPRI.1996.502674"},{"issue":"3","key":"42_CR25","first-page":"1","volume":"1","author":"S.T. Wierzchon","year":"2000","unstructured":"Wierzchon, S.T.: Discriminative power of the receptors activated by k-contiguous bits rule. Journal of Computer Science & Technology\u00a01(3), 1\u201313 (2000)","journal-title":"Journal of Computer Science & Technology"},{"key":"42_CR26","unstructured":"de Castro, L.N., Timmis, J.: Artificial immune systems: a new computational intelligence approach. Springer (2002)"},{"key":"42_CR27","unstructured":"Ayara, M., Timmis, J., de Lemos, R., de Castro, L.N., Duncan, R.: Negative selection: How to generate detectors. In: Proceedings of the 1st International Conference on Artificial Immune Systems (ICARIS), Canterbury, UK:[sn], vol.\u00a01, pp. 89\u201398 (2002)"},{"issue":"4","key":"42_CR28","doi-asserted-by":"publisher","first-page":"383","DOI":"10.1023\/A:1026195112518","volume":"4","author":"F.A. Gonz\u00e1lez","year":"2003","unstructured":"Gonz\u00e1lez, F.A., Dasgupta, D.: Anomaly detection using real-valued negative selection. Genetic Programming and Evolvable Machines\u00a04(4), 383\u2013403 (2003)","journal-title":"Genetic Programming and Evolvable Machines"},{"key":"42_CR29","unstructured":"Gonzalez, F., Dasgupta, D.: Neuro-immune and self-organizing map approaches to anomaly detection: A comparison. In: First International Conference on Artificial Immune Systems, pp. 203\u2013211 (2002)"},{"key":"42_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"287","DOI":"10.1007\/978-3-540-24854-5_30","volume-title":"Genetic and Evolutionary Computation \u2013 GECCO 2004","author":"Z. Ji","year":"2004","unstructured":"Ji, Z., Dasgupta, D.: Real-valued negative selection algorithm with variable-sized detectors. In: Deb, K., Tari, Z. (eds.) GECCO 2004. LNCS, vol.\u00a03102, pp. 287\u2013298. Springer, Heidelberg (2004)"},{"key":"42_CR31","unstructured":"Brownlee, J.: Artificial immune recognition system (airs)-a review and analysis. Swinburne University of Technology, Melbourne, Australia. Tech. Rep. (1-02) (2005)"},{"issue":"3","key":"42_CR32","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1023\/B:GENP.0000030197.83685.94","volume":"5","author":"A. Watkins","year":"2004","unstructured":"Watkins, A., Timmis, J., Boggess, L.: Artificial immune recognition system (airs): An immune-inspired supervised learning algorithm. Genetic Programming and Evolvable Machines\u00a05(3), 291\u2013317 (2004)","journal-title":"Genetic Programming and Evolvable Machines"},{"key":"42_CR33","unstructured":"Watkins, A., Timmis, J.: Artificial immune recognition system (airs): Revisions and refinements. In: AISB 2004 Convention, p. 18 (2002)"},{"key":"42_CR34","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"427","DOI":"10.1007\/978-3-540-30220-9_34","volume-title":"Artificial Immune Systems","author":"A. Watkins","year":"2004","unstructured":"Watkins, A., Timmis, J.: Exploiting parallelism inherent in AIRS, an artificial immune classifier. In: Nicosia, G., Cutello, V., Bentley, P.J., Timmis, J. (eds.) ICARIS 2004. LNCS, vol.\u00a03239, pp. 427\u2013438. Springer, Heidelberg (2004)"},{"issue":"3","key":"42_CR35","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1109\/TEVC.2002.1011539","volume":"6","author":"L.N. De Castro","year":"2002","unstructured":"De Castro, L.N., Von Zuben, F.J.: Learning and optimization using the clonal selection principle. IEEE Transactions on Evolutionary Computation\u00a06(3), 239\u2013251 (2002)","journal-title":"IEEE Transactions on Evolutionary Computation"},{"key":"42_CR36","unstructured":"Brownlee, J.: Immunos-81 the misunderstood artificial immune system, ciscp, faculty of ict, swinburne university of technology. Technical report, Australia, Technical Report 1-02 (2005)"}],"container-title":["Advances in Intelligent Systems and Computing","Recent Advances on Soft Computing and Data Mining"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-07692-8_42","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,3]],"date-time":"2025-05-03T04:57:27Z","timestamp":1746248247000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-07692-8_42"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319076911","9783319076928"],"references-count":36,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-07692-8_42","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2014]]}}}