{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,10]],"date-time":"2025-06-10T17:40:05Z","timestamp":1749577205619,"version":"3.41.0"},"publisher-location":"Cham","reference-count":13,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319453774"},{"type":"electronic","value":"9783319453781"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-45378-1_5","type":"book-chapter","created":{"date-parts":[[2016,9,8]],"date-time":"2016-09-08T05:04:15Z","timestamp":1473311055000},"page":"43-54","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Embedding the V-Detector Algorithm in FPGA"],"prefix":"10.1007","author":[{"given":"Maciej","family":"Brzozowski","sequence":"first","affiliation":[]},{"given":"Andrzej","family":"Chmielewski","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,9,9]]},"reference":[{"key":"5_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"420","DOI":"10.1007\/3-540-44503-X_27","volume-title":"Database Theory - ICDT 2001","author":"CC Aggarwal","year":"2000","unstructured":"Aggarwal, C.C., Hinneburg, A., Keim, D.A.: On the surprising behavior of distance metrics in high dimensional space. In: Van den Bussche, J., Vianu, V. (eds.) ICDT 2001. LNCS, vol. 1973, pp. 420\u2013434. Springer, Heidelberg (2000)"},{"key":"5_CR2","unstructured":"Balthrop, J., Esponda, F., Forrest, S., Glickman, M.: Coverage and generalization in an artificial immune system. In: Proceedings of the Genetic and Evolutionary Computation Conference (GECCO 2002), New York, 9\u201313 July 2002, pp. 3\u201310 (2002)"},{"key":"5_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"615","DOI":"10.1007\/978-3-662-45237-0_56","volume-title":"Computer Information Systems and Industrial Management","author":"M Brzozowski","year":"2014","unstructured":"Brzozowski, M., Chmielewski, A.: Hardware approach for generating b-detectors by immune-based algorithms. In: Saeed, K., Sn\u00e1\u0161el, V. (eds.) CISIM 2014. LNCS, vol. 8838, pp. 615\u2013623. Springer, Heidelberg (2014)"},{"key":"5_CR4","doi-asserted-by":"publisher","DOI":"10.1002\/0471786411","volume-title":"RTL Hardware Design Using VHDL: Coding for Efficiency, Portability, and Scalability","author":"PP Chu","year":"2006","unstructured":"Chu, P.P.: RTL Hardware Design Using VHDL: Coding for Efficiency, Portability, and Scalability. Wiley-Interscience, New Jersey (2006)"},{"key":"5_CR5","first-page":"39","volume":"2","author":"A Chmielewski","year":"2007","unstructured":"Chmielewski, A., Wierzcho\u0144, S.T.: On the distance norms for multidimensional dataset in the case of real-valued negative selection application. Zesz. Nauk. Politech. Bia\u0142ost. 2, 39\u201350 (2007)","journal-title":"Zesz. Nauk. Politech. Bia\u0142ost."},{"key":"5_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"242","DOI":"10.1007\/978-3-642-33260-9_21","volume-title":"Computer Information Systems and Industrial Management","author":"A Chmielewski","year":"2012","unstructured":"Chmielewski, A., Wierzcho\u0144, S.T.: Hybrid negative selection approach for anomaly detection. In: Cortesi, A., Chaki, N., Saeed, K., Wierzcho\u0144, S. (eds.) CISIM 2012. LNCS, vol. 7564, pp. 242\u2013253. Springer, Heidelberg (2012)"},{"key":"5_CR7","unstructured":"Forrest, S., Hofmeyr, S.A., Somayaji, A., Longstaff, T.A.: A sense of self for unix processes. In: Proceedings of the 1996 IEEE Symposium on Research in Security and Privacy, pp. 120\u2013128. IEEE Computer Society Press (1996)"},{"key":"5_CR8","doi-asserted-by":"crossref","unstructured":"Forrest, S., Perelson, A., Allen, L., Cherukuri, R.: Self-nonself discrimination in a computer. In: Proceedings of the IEEE Symposium on Research in Security and Privacy, Los Alamitos, pp. 202\u2013212 (1994)","DOI":"10.1109\/RISP.1994.296580"},{"key":"5_CR9","doi-asserted-by":"publisher","first-page":"252","DOI":"10.1109\/TEVC.2002.1011540","volume":"6","author":"PK Harmer","year":"2002","unstructured":"Harmer, P.K., Wiliams, P.D., Gunsch, G.H., Lamont, G.B.: Artificial immune system architecture for computer security applications. IEEE Trans. Evol. Comput. 6, 252\u2013280 (2002)","journal-title":"IEEE Trans. Evol. Comput."},{"key":"5_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"287","DOI":"10.1007\/978-3-540-24854-5_30","volume-title":"Genetic and Evolutionary Computation \u2013 GECCO 2004","author":"Z Ji","year":"2004","unstructured":"Ji, Z., Dasgupta, D.: Real-valued negative selection algorithm with variable-sized detectors. In: Deb, K., Tari, Z. (eds.) GECCO 2004. LNCS, vol. 3102, pp. 287\u2013298. Springer, Heidelberg (2004)"},{"issue":"2","key":"5_CR11","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1162\/evco.2007.15.2.223","volume":"15","author":"Z Ji","year":"2007","unstructured":"Ji, Z., Dasgupta, D.: Revisiting negative selection algorithms. Evol. Comput. 15(2), 223\u2013251 (2007)","journal-title":"Evol. Comput."},{"key":"5_CR12","doi-asserted-by":"crossref","unstructured":"Stibor, T., Mohr, P.H., Timmis, J., Eckert, C.: Is negative selection appropriate for anomaly detection? In: GECCO 2005, pp. 321\u2013328 (2005)","DOI":"10.1145\/1068009.1068061"},{"key":"5_CR13","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-1791-0","volume-title":"High-Performance Computing Using FPGAs","author":"W Vanderbauwhede","year":"2013","unstructured":"Vanderbauwhede, W., Benkrid, K.: High-Performance Computing Using FPGAs. Springer, New York (2013)"}],"container-title":["Lecture Notes in Computer Science","Computer Information Systems and Industrial Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-45378-1_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,10]],"date-time":"2025-06-10T17:22:29Z","timestamp":1749576149000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-45378-1_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319453774","9783319453781"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-45378-1_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"9 September 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CISIM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP International Conference on Computer Information Systems and Industrial Management","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Vilnius","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Lithuania","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 September 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 September 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cisim2016","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}