{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,31]],"date-time":"2025-03-31T18:43:38Z","timestamp":1743446618848},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540407669"},{"type":"electronic","value":"9783540451921"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/978-3-540-45192-1_22","type":"book-chapter","created":{"date-parts":[[2010,6,23]],"date-time":"2010-06-23T23:30:20Z","timestamp":1277335820000},"page":"229-241","source":"Crossref","is-referenced-by-count":59,"title":["Revisiting the Foundations of Artificial Immune Systems: A Problem-Oriented Perspective"],"prefix":"10.1007","author":[{"given":"Alex A.","family":"Freitas","sequence":"first","affiliation":[]},{"given":"Jon","family":"Timmis","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"22_CR1","doi-asserted-by":"crossref","unstructured":"Aha, D.W.: Artificial Intelligence Review \u2013 special issue on lazy learning, June 1997, vol.\u00a011(1-5) (1997)","DOI":"10.1023\/A:1006538427943"},{"key":"22_CR2","volume-title":"Proc. Congress on Evolutionary Computation (CEC-2002)","author":"K.P. Anchor","year":"2002","unstructured":"Anchor, K.P., Williams, P.D., Gunsch, G.H., Lamont, G.B.: The computer defense immune system: current and future research in intrusion detection. In: Proc. Congress on Evolutionary Computation (CEC-2002), IEEE Press, Los Alamitos (2002)"},{"key":"22_CR3","first-page":"3","volume-title":"Proc. Genetic and Evolutionary Computation Conf. (GECCO- 2002)","author":"J. Balthrop","year":"2002","unstructured":"Balthrop, J., Esponda, F., Forrest, S., Glickman, M.: Coverage and generalization in an artificial immune system. In: Proc. Genetic and Evolutionary Computation Conf. (GECCO- 2002), pp. 3\u201310. Morgan Kaufmann, San Francisco (2002)"},{"key":"22_CR4","doi-asserted-by":"publisher","first-page":"1039","DOI":"10.1109\/CEC.2002.1004386","volume-title":"Proc. Congress on Evolutionary Computation (CEC-2002)","author":"D. Dasgupta","year":"2002","unstructured":"Dasgupta, D., Majumdar, N.S.: Anomaly detection in multidimensional data using negative selection algorithm. In: Proc. Congress on Evolutionary Computation (CEC-2002), pp. 1039\u20131044. IEEE Press, Los Alamitos (2002)"},{"key":"22_CR5","volume-title":"Artificial Immune Systems: a new computational intelligence approach","author":"L.N. Castro de","year":"2002","unstructured":"de Castro, L.N., Timmis, J.: Artificial Immune Systems: a new computational intelligence approach. Springer, Heidelberg (2002)"},{"key":"22_CR6","doi-asserted-by":"crossref","unstructured":"Forrest, S., Perelson, A.S., Allen, L., Cherukuri, R.: Self-nonself discrimination in a computer. In: Proc. IEEE Symp. On Research in Security and Privacy, pp. 202\u2013212 (1994)","DOI":"10.1109\/RISP.1994.296580"},{"key":"22_CR7","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-04923-5","volume-title":"Data Mining and Knowledge Discovery with Evolutionary Algorithms","author":"A.A. Freitas","year":"2002","unstructured":"Freitas, A.A.: Data Mining and Knowledge Discovery with Evolutionary Algorithms. Springer, Heidelberg (2002)"},{"key":"22_CR8","first-page":"1081","volume-title":"Proc. Genetic and Evolutionary Computation Conf. (GECCO-2002)","author":"F.A. Gonzalez","year":"2002","unstructured":"Gonzalez, F.A., Dasgupta, D.: An immunogenetic technique to detect anomalies in network traffic. In: Proc. Genetic and Evolutionary Computation Conf. (GECCO-2002), pp. 1081\u20131088. Morgan Kaufmann, San Francisco (2002)"},{"key":"22_CR9","volume-title":"Proc. Genetic and Evolutionary Computation Conf. (GECCO-1999)","author":"S.A. Hofmeyr","year":"1999","unstructured":"Hofmeyr, S.A., Forrest, S.: Immunity by design: an artificial immune system. In: Proc. Genetic and Evolutionary Computation Conf. (GECCO-1999), Morgan Kaufmann, San Francisco (1999)"},{"key":"22_CR10","volume-title":"Proc. Congress on Evolutionary Computation (CEC-2002)","author":"J. Kim","year":"2002","unstructured":"Kim, J., Bentley, P.J.: Towards an artificial immune system for network intrusion detection: an investigation of dynamic clonal selection. In: Proc. Congress on Evolutionary Computation (CEC-2002), IEEE Press, Los Alamitos (2002)"},{"key":"22_CR11","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1080\/088395198117730","volume":"12","author":"T.W. Liao","year":"1998","unstructured":"Liao, T.W., Zhang, Z., Mount, C.R.: Similarity measures for retrieval in case-based reasoning systems. Applied Artificial Intelligence\u00a012, 267\u2013288 (1998)","journal-title":"Applied Artificial Intelligence"},{"key":"22_CR12","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1016\/0004-3702(83)90016-4","volume":"20","author":"R.W. Michalski","year":"1983","unstructured":"Michalski, R.W.: A theory and methodology of inductive learning. Artificial Intelligence\u00a020, 111\u2013161 (1983)","journal-title":"Artificial Intelligence"},{"key":"22_CR13","unstructured":"Michie, D., Spiegelhalter, D.J., Taylor, C.C.: Machine Learning, Neural and Statistical Classification. Ellis Horwood, New York"},{"key":"#cr-split#-22_CR14.1","unstructured":"Mitchell, T.M.: The need for biases in learning generalizations. Rutgers Technical Report (1980);"},{"key":"#cr-split#-22_CR14.2","unstructured":"Also published in: J.W. Shavlik and T.G. Dietterich (Eds.) Readings in Machine Learning, 184-191. Morgan Kaufmann, 1990."},{"key":"22_CR15","volume-title":"Machine Learning","author":"T.M. Mitchell","year":"1997","unstructured":"Mitchell, T.M.: Machine Learning. McGraw-Hill, New York (1997)"},{"key":"22_CR16","first-page":"1019","volume-title":"Proc. 14th Int. Joint Conf. on Artificial Intelligence (IJCAI 1995)","author":"J.R. Quinlan","year":"1995","unstructured":"Quinlan, J.R., Cameron-Jones, R.: Oversearching and layered search in empirical learning. In: Proc. 14th Int. Joint Conf. on Artificial Intelligence (IJCAI 1995), pp. 1019\u20131024. Morgan Kaufmann, San Francisco (1995)"},{"key":"22_CR17","doi-asserted-by":"crossref","unstructured":"Rao, R.B., Gordon, D., Spears, W.: For every generalization action, is there really an equal and opposite reaction? Analysis of the conservation law for generalization performance. In: Proc. 12th Int. Conf. on Machine Learning, pp. 471\u2013479. Morgan Kaufmann, San Francisco","DOI":"10.1016\/B978-1-55860-377-6.50065-7"},{"key":"22_CR18","doi-asserted-by":"crossref","unstructured":"Schaffer, C.: A conservation law for generalization performance. In: Proc. 11th Int. Conf. on Machine Learning, pp. 259\u2013265. Morgan Kaufmann, San Francisco","DOI":"10.1016\/B978-1-55860-335-6.50039-8"},{"key":"22_CR19","unstructured":"Singh, S.: Anomaly detection using negative selection based on the r-contiguous matching rule. In: Proc. 1st Int. Conf. on Artificial Immune Systems (ICARIS-2002), University of Kent at Canterbury, UK, September 2002, pp. 99\u2013106 (2002)"},{"issue":"12","key":"22_CR20","doi-asserted-by":"publisher","first-page":"1213","DOI":"10.1145\/7902.7906","volume":"29","author":"G. Stanfill","year":"1986","unstructured":"Stanfill, G., Waltz, D.: Towards memory-based reasoning. Communications of the ACM\u00a029(12), 1213\u20131228 (1986)","journal-title":"Communications of the ACM"},{"key":"22_CR21","volume-title":"Proc. Congress on Evolutionary Computation (CEC-2002)","author":"A.B. Watkins","year":"2002","unstructured":"Watkins, A.B., Boggess, L.: A resource limited artificial immune system classifier. In: Proc. Congress on Evolutionary Computation (CEC-2002), IEEE Press, Los Alamitos (2002)"},{"key":"22_CR22","unstructured":"Watkins, A., Timmis, J.: Artificial Immune Recognition System (AIRS): revisions and refinements. In: Proc. 1st Int. Conf. on Artificial Immune Systems (ICARIS-2002), University of Kent at Canterbury, UK, September 2002, pp. 173\u2013181 (2002)"},{"key":"22_CR23","volume-title":"Data Mining: practical machine learning tools and techniques with Java implementations","author":"I.H. Witten","year":"2000","unstructured":"Witten, I.H., Frank, E.: Data Mining: practical machine learning tools and techniques with Java implementations. Morgan Kaufmann, San Francisco (2000)"}],"container-title":["Lecture Notes in Computer Science","Artificial Immune Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-45192-1_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T10:55:28Z","timestamp":1559213728000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-45192-1_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540407669","9783540451921"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-45192-1_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2003]]}}}