{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T17:38:29Z","timestamp":1725557909032},"publisher-location":"Berlin, Heidelberg","reference-count":25,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540407669"},{"type":"electronic","value":"9783540451921"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/978-3-540-45192-1_16","type":"book-chapter","created":{"date-parts":[[2010,6,23]],"date-time":"2010-06-23T19:30:20Z","timestamp":1277321420000},"page":"156-167","source":"Crossref","is-referenced-by-count":22,"title":["A Danger Theory Inspired Approach to Web Mining"],"prefix":"10.1007","author":[{"given":"Andrew","family":"Secker","sequence":"first","affiliation":[]},{"given":"Alex A.","family":"Freitas","sequence":"additional","affiliation":[]},{"given":"Jon","family":"Timmis","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"16_CR1","volume-title":"Artificial Immune Systems: A New Computational Intelligence Approach","author":"L.N. Castro de","year":"2002","unstructured":"de Castro, L.N., Timmis, J.: Artificial Immune Systems: A New Computational Intelligence Approach. Springer, Heidelberg (2002)"},{"key":"16_CR2","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/978-3-642-59901-9","volume-title":"Artificial Immune Systems and Their Applications","author":"D. Dasgupta","year":"1999","unstructured":"Dasgupta, D.: An overview of Artificial Immune Systems. In: Dasgupta, D. (ed.) Artificial Immune Systems and Their Applications, pp. 3\u201321. Springer, Heidelberg (1999)"},{"issue":"2","key":"16_CR3","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1006\/jnca.1996.0014","volume":"19","author":"J.E. Hunt","year":"1996","unstructured":"Hunt, J.E., Cooke, D.E.: Learning using an artificial immune system. Journa of Network and Computer Applications\u00a019(2), 189\u2013212 (1996)","journal-title":"Journa of Network and Computer Applications"},{"key":"16_CR4","unstructured":"Watkins, A.: AIRS: A resource limited artificial immune classifier. Masters Thesis, Mississippi State University (2001)"},{"key":"16_CR5","unstructured":"Watkins, A., Timmis, J.: Artificial Immune Recognition System (AIRS): Revisions and Refinements. In: Bentley, P.J., Lee, D., Jung, S. (eds.) ICARIS 2008. LNCS, vol.\u00a05132, pp. 173\u2013181. Springer, Heidelberg (2008)"},{"issue":"3-4","key":"16_CR6","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1016\/S0950-7051(01)00088-0","volume":"14","author":"J. Timmis","year":"2001","unstructured":"Timmis, J., Neal, M.: A resource limited artificial immune system for data analysis. Knowledge Based Systems\u00a014(3-4), 121\u2013130 (2001)","journal-title":"Knowledge Based Systems"},{"key":"16_CR7","doi-asserted-by":"crossref","unstructured":"Timmis, J., Knight, T.: Artificial Immune Systems: Using The Immune System as Inspiration for Data Mining. In: Abbass, H.A., Sarker, R.A., Newton, C.S. (eds.) Data Mining: A Heuristic Approach, pp. 209\u2013230. Idea Group Publishing (2002)","DOI":"10.4018\/978-1-930708-25-9.ch011"},{"key":"16_CR8","volume-title":"Modern Information Retrieval","author":"R. Baeza-Yates","year":"1999","unstructured":"Baeza-Yates, R., Ribeiro-Neto, B.: Modern Information Retrieval. Addison Wesley Longman, Amsterdam (1999)"},{"key":"16_CR9","first-page":"301","volume":"296","author":"P. Matzinger","year":"2002","unstructured":"Matzinger, P.: The Danger Model. A Renewed Sense of Self. Science\u00a0296, 301\u2013305 (2002a)","journal-title":"A Renewed Sense of Self. Science"},{"key":"16_CR10","doi-asserted-by":"crossref","unstructured":"Aickelin, U., Cayzer, S.: The Danger Theory and Its Application to Artificial Immune Systems. In: proceedings of The First International Conference on Artificial Immune Systems (ICARIS 2002), Canterbury, UK, pp. 141\u2013148 (2002)","DOI":"10.2139\/ssrn.2832054"},{"issue":"5","key":"16_CR11","doi-asserted-by":"publisher","first-page":"399","DOI":"10.1006\/smim.1998.0143","volume":"10","author":"P. Matzinger","year":"1998","unstructured":"Matzinger, P.: An Innate Sense of Danger. Seminars in Immunology\u00a010(5), 399\u2013415 (1998)","journal-title":"Seminars in Immunology"},{"issue":"3","key":"16_CR12","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1006\/smim.2000.0236","volume":"12","author":"C. Anderson","year":"2000","unstructured":"Anderson, C., Matzinger, P.: Danger: The view from the bottom of the cliff. Seminars in Immunology\u00a012(3), 231\u2013238 (2000)","journal-title":"Seminars in Immunology"},{"key":"16_CR13","unstructured":"Matzinger, P.: The Real Function of The Immune System or Tolerance and The Four D\u2019s. Retrieved 30\/10\/2002 (2002b), from http:\/\/cmmg.biosci.wayne.edu\/asg\/polly.html"},{"issue":"1","key":"16_CR14","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1016\/S0952-7915(00)00191-6","volume":"13","author":"S. Gallucci","year":"2001","unstructured":"Gallucci, S., Matzinger, P.: Danger signals: SOS to the immune system. Current Opinion in Immunology\u00a013(1), 114\u2013119 (2001)","journal-title":"Current Opinion in Immunology"},{"key":"16_CR15","unstructured":"Williamson, M.M.: Biologically Inspired Approaches to Computer Security (HP Labs Technical Reports HPL-2002-131): HP Labs Bristol, UK (2002), Available from http:\/\/www.hpl.hp.com\/techreports\/2002\/HPL-2002-131.html"},{"key":"16_CR16","unstructured":"Burgess, M.: Computer Immunology. In: proceedings of The 12th Systems Administration Conference (LISA 1988),Boston, USA (1998)"},{"key":"16_CR17","unstructured":"Kim, J., Bentley, P.J.: An Evaluation of Negative Selection in an Artificial Immune System for Network Intrusion Detection. In: proceedings of The Genetic and Evolutionary Computation Conference 2001 (GECCO 2001), San Francisco, USA, July 7-11, pp. 1330\u20131337 (2001)"},{"key":"16_CR18","volume-title":"Mining the web (Discovering Knowledge from Hypertext Data)","author":"S. Chakrabarti","year":"2003","unstructured":"Chakrabarti, S.: Mining the web (Discovering Knowledge from Hypertext Data). Morgan Kaufmann, San Francisco (2003)"},{"key":"16_CR19","volume-title":"Mining the web (Transforming Customer Data into Customer Value)","author":"G.S. Linoff","year":"2001","unstructured":"Linoff, G.S., Berry, M.J.A.: Mining the web (Transforming Customer Data into Customer Value). Wiley, Chichester (2001)"},{"key":"16_CR20","unstructured":"Nasraoui, O., Dasgupta, D., Gonzalez, F.: The Promise and Challenges of Artificial Immune System Based Web Usage Mining: Preliminary Results. In: proceedings of The SIAM Workshop on Web Analytics, Arlington, VA, pp. 29\u201339 (2002)"},{"key":"16_CR21","unstructured":"Twycross, J.: An Immune System Approach to Document Classification (HP Labs Technical Reports HPL-2002-288): HP Labs Bristol, UK (2002), Available from http:\/\/www.hpl.hp.com\/techreports\/2002\/HPL-2002-288.html"},{"key":"16_CR22","unstructured":"Twycross, J., Cayzer, S.: An Immune System Approach to Document Classification (HP Labs Technical Reports HPL-2002-292): HP Labs Bristol, UK (2002), Available from http:\/\/www.hpl.hp.com\/techreports\/2002\/HPL-2002-292.html"},{"key":"16_CR23","unstructured":"Blake, C.L., Merz, C.J.: UCI Repository of machine learning databases (1998) Retrieved 20 May 2003, from http:\/\/www.ics.uci.edu\/~mlearn\/MLRepository.html"},{"key":"16_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"408","DOI":"10.1007\/3-540-45571-X_48","volume-title":"Knowledge Discovery and Data Mining. Current Issues and New Applications","author":"Y. Diao","year":"2000","unstructured":"Diao, Y., Lu, H., Wu, D.: A comparative study of classification based personal e-mail filtering. In: Terano, T., Chen, A.L.P. (eds.) PAKDD 2000. LNCS, vol.\u00a01805, pp. 408\u2013419. Springer, Heidelberg (2000)"},{"key":"16_CR25","doi-asserted-by":"crossref","unstructured":"Liu, B., Ma, Y., Yu, P.S.: Discovering unexpected information from your competitors web sites. In: proceedings of The Seventh ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD 2001), San Francisco, USA, pp. 144\u2013153 (2001)","DOI":"10.1145\/502512.502534"}],"container-title":["Lecture Notes in Computer Science","Artificial Immune Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-45192-1_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T06:55:52Z","timestamp":1559199352000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-45192-1_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540407669","9783540451921"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-45192-1_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2003]]}}}