{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T17:38:22Z","timestamp":1725557902624},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540407669"},{"type":"electronic","value":"9783540451921"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/978-3-540-45192-1_23","type":"book-chapter","created":{"date-parts":[[2010,6,23]],"date-time":"2010-06-23T23:30:20Z","timestamp":1277335820000},"page":"242-248","source":"Crossref","is-referenced-by-count":5,"title":["Complementary Dual Detectors for Effective Classification"],"prefix":"10.1007","author":[{"given":"Hyi Taek","family":"Ceong","sequence":"first","affiliation":[]},{"given":"Young-il","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Doheon","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Kwang-Hyung","family":"Lee","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"23_CR1","unstructured":"Timmis, J., Neal, M.: Investigating the Evolution and Stability of a Resource Limited Artificial Immune System. In: Proc. of the Genetic and Evolutionary Compuation Conference,Workshop on Artificial Immune Systems and Their Applications, pp. 40\u201341 (2000)"},{"key":"23_CR2","volume-title":"Proc. of the 1994 IEEE Symposium on Research in Security and Privacy","author":"S. Forrest","year":"1994","unstructured":"Forrest, S., Perelson, A., Allen, L., Cherukuri, R.: Self-Nonself Discrimination in a Computer. In: Proc. of the 1994 IEEE Symposium on Research in Security and Privacy, IEEE Computer Society Press, Los Alamitos (1994)"},{"key":"23_CR3","unstructured":"Chao, D., Forrest, S.: Information Immune System. In: Timmis, J., Bentley, P.J. (eds.) Proc. of ICARIS 2002, pp. 132\u2013140 (2002)"},{"key":"23_CR4","unstructured":"Esponda, F., Forrest, S., Helman, P.: A Formal Framework for Positive and Negative Detection Schemes, http:\/\/www.cs.unm.edu\/immsec\/publications\/PositiveandNegativeDetection.pdf"},{"key":"23_CR5","unstructured":"Williamson, M.M.: Biologically inspired approaches to computer security, Tech. Rep. HPL-2002-131, HP Laboratories (June 2002)"},{"key":"23_CR6","unstructured":"Ayara, M., Timmis, J., De Lemos, R., de Castro, L., Duncan, R.: Negative Selection: How to Generate Detectors. In: Timmis, J., Bentley, P.J. (eds.) Proc. of ICARIS 2002, pp. 89\u201398 (2002)"},{"key":"23_CR7","doi-asserted-by":"crossref","unstructured":"Wierzchon, S.: Generating Optimal Repertoire of Antibody Strings in an Artificail Immune System. In: Klopotek, M.A., Michalewicz, M., Wierzchon, S.T. (eds.) Intelligent Information Systems. Advances in Soft Computing Series. Physica-Verlag\/Springer, Heidelberg\/ New York (2000)","DOI":"10.1007\/978-3-7908-1846-8_12"},{"key":"23_CR8","doi-asserted-by":"crossref","unstructured":"I.B.M. (2002), http:\/\/www.research.ibm.com\/antivirus\/","DOI":"10.1145\/504689.504690"},{"key":"23_CR9","unstructured":"Mail Abuse Prevention System: Definition of SPAM, http:\/\/mailabuse.org\/standard.html"},{"key":"23_CR10","volume-title":"Artificial Immune Systems: A New Computational Ingelligence Approach","author":"L. Castro de","year":"2002","unstructured":"de Castro, L., Timmis, J.: Artificial Immune Systems: A New Computational Ingelligence Approach. Springer, Heidelberg (2002)"},{"key":"23_CR11","unstructured":"D\u2019haeseleer, P., Forrest, S., Helman, P.: An Immunological Approach to Change Detection: Algorithms, Analysis and Implications. In: Proc. of IEEE Symposium on Research in Security and Privacy, Oakland, CA (1996)"}],"container-title":["Lecture Notes in Computer Science","Artificial Immune Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-45192-1_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,27]],"date-time":"2024-03-27T20:06:39Z","timestamp":1711569999000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-45192-1_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540407669","9783540451921"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-45192-1_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2003]]}}}