{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T08:00:16Z","timestamp":1725868816395},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319480565"},{"type":"electronic","value":"9783319480572"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-48057-2_5","type":"book-chapter","created":{"date-parts":[[2016,10,22]],"date-time":"2016-10-22T04:37:01Z","timestamp":1477111021000},"page":"75-92","source":"Crossref","is-referenced-by-count":1,"title":["Immune Approach to the Protection of IoT Devices"],"prefix":"10.1007","author":[{"given":"Andrzej","family":"Chmielewski","sequence":"first","affiliation":[]},{"given":"Maciej","family":"Brzozowski","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,10,23]]},"reference":[{"key":"5_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"420","DOI":"10.1007\/3-540-44503-X_27","volume-title":"Database Theory - ICDT 2001","author":"CC Aggarwal","year":"2000","unstructured":"Aggarwal, C.C., Hinneburg, A., Keim, D.A.: On the surprising behavior of distance metrics in high dimensional space. In: Van den Bussche, J., Vianu, V. (eds.) ICDT 2001. LNCS, vol. 1973, pp. 420\u2013434. Springer, Heidelberg (2000). doi: 10.1007\/3-540-44503-X_27"},{"key":"5_CR2","unstructured":"Balthrop, J., Esponda, F., Forrest, S., Glickman, M.: Coverage and generalization in an artificial immune system. In: Proceedings of the Genetic and Evolutionary Computation Conference (GECCO 2002), New York, pp. 3\u201310, 9\u201313 July 2002"},{"key":"5_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1007\/978-3-319-45378-1_5","volume-title":"Computer Information Systems and Industrial Management","author":"M Brzozowski","year":"2016","unstructured":"Brzozowski, M., Chmielewski, A.: Embedding the V-detector algorithm in FPGA. In: Saeed, K., Homenda, W. (eds.) CISIM 2016. LNCS, vol. 9842, pp. 43\u201354. Springer, Heidelberg (2016). doi: 10.1007\/978-3-319-45378-1_5"},{"key":"5_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"615","DOI":"10.1007\/978-3-662-45237-0_56","volume-title":"Computer Information Systems and Industrial Management","author":"M Brzozowski","year":"2014","unstructured":"Brzozowski, M., Chmielewski, A.: Hardware approach for generating b-detectors by immune-based algorithms. In: Saeed, K., Sn\u00e1\u0161el, V. (eds.) CISIM 2014. LNCS, vol. 8838, pp. 615\u2013623. Springer, Heidelberg (2014). doi: 10.1007\/978-3-662-45237-0_56"},{"key":"5_CR5","doi-asserted-by":"crossref","DOI":"10.1002\/0471786411","volume-title":"RTL Hardware Design Using VHDL: Coding for Efficiency, Portability, and Scalability","author":"PP Chu","year":"2006","unstructured":"Chu, P.P.: RTL Hardware Design Using VHDL: Coding for Efficiency, Portability, and Scalability. Wiley-Interscience, Hoboken (2006)"},{"key":"5_CR6","volume-title":"Artificial Immune Systems: A New Computational Intelligence Approach","author":"L Castro de","year":"2002","unstructured":"de Castro, L., Timmis, J.: Artificial Immune Systems: A New Computational Intelligence Approach. Springer, London (2002)"},{"key":"5_CR7","unstructured":"Chmielewski, A., Wierzcho\u0144, S.T.: On the distance norms for multidimensional dataset in the case of real-valued negative selection application. Zeszyty Naukowe Politechniki Bia\u0142ostockiej, No. 2, pp. 39\u201350 (2007)"},{"key":"5_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"242","DOI":"10.1007\/978-3-642-33260-9_21","volume-title":"Computer Information Systems and Industrial Management","author":"A Chmielewski","year":"2012","unstructured":"Chmielewski, A., Wierzcho\u0144, S.T.: Hybrid negative selection approach for anomaly detection. In: Cortesi, A., Chaki, N., Saeed, K., Wierzcho\u0144, S. (eds.) CISIM 2012. LNCS, vol. 7564, pp. 242\u2013253. Springer, Heidelberg (2012). doi: 10.1007\/978-3-642-33260-9_21"},{"key":"5_CR9","unstructured":"Dasgupta, D., Forrest, S.: Novelty detection in time series data using ideas from immunology. In: Fifth International Conference on Intelligent Systems, Reno, Nevada, 19\u201321 June 1996"},{"key":"5_CR10","doi-asserted-by":"crossref","unstructured":"Forrest, S., Hofmeyr, S. A., Somayaji, A., Longstaff, T. A.: A sense of self for Unix processes. In: Proceedings of the 1996 IEEE Symposium on Research in Security and Privacy, pp. 120\u2013128. IEEE Computer Society Press (1996)","DOI":"10.1109\/SECPRI.1996.502675"},{"key":"5_CR11","doi-asserted-by":"crossref","unstructured":"Forrest, S., Perelson, A., Allen, L., Cherukuri, R.: Self-nonself discrimination in a computer. In: Proceedings of the IEEE Symposium on Research in Security and Privacy, Los Alamitos, pp. 202\u2013212 (1994)","DOI":"10.1109\/RISP.1994.296580"},{"key":"5_CR12","doi-asserted-by":"crossref","first-page":"252","DOI":"10.1109\/TEVC.2002.1011540","volume":"6","author":"PK Harmer","year":"2002","unstructured":"Harmer, P.K., Wiliams, P.D., Gunsch, G.H., Lamont, G.B.: Artificial immune system architecture for computer security applications. IEEE Trans. Evol. Comput. 6, 252\u2013280 (2002)","journal-title":"IEEE Trans. Evol. Comput."},{"issue":"4","key":"5_CR13","doi-asserted-by":"crossref","first-page":"443","DOI":"10.1162\/106365600568257","volume":"8","author":"S Hofmeyr","year":"2000","unstructured":"Hofmeyr, S., Forrest, S.: Architecture for an artificial immune system. Evol. Comput. J. 8(4), 443\u2013473 (2000)","journal-title":"Evol. Comput. J."},{"key":"5_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"287","DOI":"10.1007\/978-3-540-24854-5_30","volume-title":"Genetic and Evolutionary Computation \u2013 GECCO 2004","author":"Z Ji","year":"2004","unstructured":"Ji, Z., Dasgupta, D.: Real-valued negative selection algorithm with variable-sized detectors. In: Deb, K., Tari, Z. (eds.) GECCO 2004. LNCS, vol. 3102, pp. 287\u2013298. Springer, Heidelberg (2004). doi: 10.1007\/978-3-540-24854-5_30"},{"issue":"2","key":"5_CR15","doi-asserted-by":"crossref","first-page":"223","DOI":"10.1162\/evco.2007.15.2.223","volume":"15","author":"Z Ji","year":"2007","unstructured":"Ji, Z., Dasgupta, D.: Revisiting negative selection algorithms. Evol. Comput. 15(2), 223\u2013251 (2007)","journal-title":"Evol. Comput."},{"key":"5_CR16","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1142\/9789812565402_0001","volume-title":"Data Mining in Time Series Databases","author":"EJ Keogh","year":"2004","unstructured":"Keogh, E.J., Chu, S., Hart, D., Pazzani, M.: Segmenting time series: a survey and novel approach. In: Last, M., Kandel, A., Bunke, H. (eds.) Data Mining in Time Series Databases, pp. 1\u201322. World Scientific, Singapore (2004)"},{"key":"5_CR17","volume-title":"Introduction to Data Compression","author":"K Sayood","year":"2005","unstructured":"Sayood, K.: Introduction to Data Compression. Elsevier, Amsterdam (2005)"},{"key":"5_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"142","DOI":"10.1007\/978-3-540-73922-7_13","volume-title":"Artificial Immune Systems","author":"T Stibor","year":"2007","unstructured":"Stibor, T.: Phase transition and the computational complexity of generating r-contiguous detectors. In: de Castro, L.N., Von Zuben, F.J., Knidel, H. (eds.) ICARIS 2007. LNCS, vol. 4628, pp. 142\u2013155. Springer, Heidelberg (2007). doi: 10.1007\/978-3-540-73922-7_13"},{"key":"5_CR19","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4614-1791-0","volume-title":"High-Performance Computing Using FPGAs","author":"W Vanderbauwhede","year":"2013","unstructured":"Vanderbauwhede, W., Benkrid, K.: High-Performance Computing Using FPGAs. Springer, New York (2013)"},{"key":"5_CR20","series-title":"Advances in Soft Computing","doi-asserted-by":"crossref","first-page":"119","DOI":"10.1007\/978-3-7908-1846-8_12","volume-title":"Intelligent Information Systems","author":"ST Wierzcho\u0144","year":"2000","unstructured":"Wierzcho\u0144, S.T.: Generating optimal repertoire of antibody strings in an artificial immune system. In: K\u0142opotek, M.A., Michalewicz, M., Wierzcho\u0144, S.T. (eds.) Intelligent Information Systems. Advances in Soft Computing, vol. 4, pp. 119\u2013133. Springer, Heidelberg (2000)"},{"key":"5_CR21","unstructured":"Wierzcho\u0144, S.T.:Deriving concise description of non-self patterns in an artificial immune system. In: Jain, L.C., Kacprzyk, J. (eds.) New Learning Paradigm in Soft Comptuning, pp. 438-458. Physica-Verlag (2001)"}],"container-title":["Lecture Notes in Computer Science","Future Data and Security Engineering"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-48057-2_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,25]],"date-time":"2017-06-25T01:51:36Z","timestamp":1498355496000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-48057-2_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319480565","9783319480572"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-48057-2_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}