{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T04:19:57Z","timestamp":1743049197169,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":25,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540705598"},{"type":"electronic","value":"9783540705604"}],"license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-70560-4_10","type":"book-chapter","created":{"date-parts":[[2008,9,9]],"date-time":"2008-09-09T09:16:32Z","timestamp":1220951792000},"page":"113-122","source":"Crossref","is-referenced-by-count":1,"title":["A New Artificial Immune System for the Detection of Abnormal Behaviour"],"prefix":"10.1007","author":[{"given":"Rachid","family":"Elmeziane","sequence":"first","affiliation":[]},{"given":"Ilham","family":"Berrada","sequence":"additional","affiliation":[]},{"given":"Ismail","family":"Kassou","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"10_CR1","doi-asserted-by":"crossref","unstructured":"Aickelin, U., Cayzer, S.: The danger theory and its application to artificial immune systems. In: The proceedings of 1st International Conference on Artificial Immune Systems (ICARIS), University of Kent at Canterbury, UK, pp. 141\u2013148 (2002)","DOI":"10.2139\/ssrn.2832054"},{"key":"10_CR2","doi-asserted-by":"publisher","first-page":"174102","DOI":"10.1103\/PhysRevLett.88.174102","volume":"88","author":"C. Bandt","year":"2002","unstructured":"Bandt, C., Prompe, B.: Permutation entropy - a natural complexity measure for time series. Phys. Rev, Lett.\u00a088, 174102 (2002)","journal-title":"Phys. Rev, Lett."},{"key":"10_CR3","doi-asserted-by":"crossref","DOI":"10.5962\/bhl.title.8281","volume-title":"The clonal selection theory of acquired immunity","author":"F. Burnet","year":"1959","unstructured":"Burnet, F.: The clonal selection theory of acquired immunity. Vanderbilt University Press, Nashville (1959)"},{"key":"10_CR4","doi-asserted-by":"crossref","unstructured":"Cahill, M., Lambert, D., Pinheiro, J.: Detecting fraud in the real world. Handbook of Massive Datasets (2002)","DOI":"10.1007\/978-1-4615-0005-6_26"},{"issue":"3","key":"10_CR5","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1145\/363958.363994","volume":"7","author":"F.J. Damerau","year":"1964","unstructured":"Damerau, F.J.: A technique computer detection and correction of spelling errors. Communications of ACM\u00a07(3), 171\u2013176 (1964)","journal-title":"Communications of ACM"},{"key":"10_CR6","doi-asserted-by":"crossref","unstructured":"Darmoul, S., Pierreval, H., Gabouj, S.: Scheduling using artificial immune system metaphors: A review. In: IEEE International Conference on Service Systems and Service Management, Troyes France, pp. 1150\u20131155 (2006)","DOI":"10.1109\/ICSSSM.2006.320670"},{"key":"10_CR7","doi-asserted-by":"crossref","unstructured":"Dasgupta, D., Forrest, S.: Artificial immune system in industrial application. In: International conference on Intelligent Processing and Manufacturing Material (IPMM), Honolulu, HI, vol.\u00a01, pp. 257\u2013267 (1999)","DOI":"10.1109\/IPMM.1999.792486"},{"key":"10_CR8","unstructured":"De Castro, L., Timmis, J.: Artificial immune systems: A new computational intelligence approach. Springer, Heidelberg (2002)"},{"issue":"6","key":"10_CR9","doi-asserted-by":"publisher","first-page":"1935","DOI":"10.1182\/blood-2002-02-0350","volume":"100","author":"S.S. Farag","year":"2002","unstructured":"Farag, S.S., et al.: Nk receptors: Biology and clinical relevance. Blood\u00a0100(6), 1935\u20131947 (2002)","journal-title":"Blood"},{"issue":"6","key":"10_CR10","doi-asserted-by":"publisher","first-page":"3042","DOI":"10.1121\/1.1738451","volume":"115","author":"K.G. Fred","year":"2004","unstructured":"Fred, K.G., Marengo, E.A., Devanery, A.J.: Time-reversal imaging with multiple signal classification considering multiple scattering between the targets. J. Acoust. Soc. Am.\u00a0115(6), 3042\u20133047 (2004)","journal-title":"J. Acoust. Soc. Am."},{"issue":"2","key":"10_CR11","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1162\/1063656054088512","volume":"13","author":"S.M. Garrett","year":"2005","unstructured":"Garrett, S.M.: How do we evaluate artificial immune systems? Evolutionary Computation\u00a013(2), 145\u2013178 (2005)","journal-title":"Evolutionary Computation"},{"key":"10_CR12","unstructured":"Goldsby, R., Kindt, T., Osborne, B.: Kuby Immunology, 4th edn. WH Freeman at MacMillan Press (2000)"},{"key":"10_CR13","unstructured":"Heerden, J.H.V.: Detection fraud in cellular telephone networks. Master\u2019s thesis, Interdepartmental program of operational Analysis. University of Stellenbosch, South Africa (2005)"},{"key":"10_CR14","volume-title":"Design Principles for the Immune System and Other Distributed Autonomous Systems ed.","author":"S.A. Hofmeyr","year":"2000","unstructured":"Hofmeyr, S.A.: An interpretative introduction to the immune system. In: Design Principles for the Immune System and Other Distributed Autonomous Systems ed., Oxford University Press, Oxford (2000)"},{"issue":"1","key":"10_CR15","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1162\/evco.1999.7.1.45","volume":"7","author":"S.A. Hofmeyr","year":"1999","unstructured":"Hofmeyr, S.A., Forrest, S.: Architecture for an artificial immune system. Journal of Evolutionary Computation\u00a07(1), 45\u201368 (1999)","journal-title":"Journal of Evolutionary Computation"},{"key":"10_CR16","series-title":"Advances in Neural Information Processing Systems 11","first-page":"889","volume-title":"P. of the Conference (NIPS 11)","author":"J. Hollmen","year":"1998","unstructured":"Hollmen, J., Tresp, V.: Call-based fraud detection in mobile communication networks using a hierarchical regime-switching model. In: Kearns, M., Solla, S., Cohn, D. (eds.) P. of the Conference (NIPS 11). Advances in Neural Information Processing Systems 11, pp. 889\u2013895. MIT Press, Cambridge (1998)"},{"issue":"1","key":"10_CR17","first-page":"29","volume":"10","author":"H. Hyyr\u00f6","year":"2003","unstructured":"Hyyr\u00f6, H.: A bit-vector algorithm for computing levenshtein and damerau edit distances Nord. J. Comput.\u00a010(1), 29\u201339 (2003)","journal-title":"J. Comput."},{"key":"10_CR18","unstructured":"Jerne, N.K.: Towards a Network Theory of the Immune System, vol.\u00a0125C, pp. 373\u2013389. Annales d\u2019Immunologie (1974)"},{"key":"10_CR19","volume-title":"Data Mining : Concepts, Models, Methods, and Algorithms","author":"M. Kantardzic","year":"2003","unstructured":"Kantardzic, M.: Data Mining: Concepts, Models, Methods, and Algorithms. John Wiley & Sons, Chichester (2003)"},{"issue":"6","key":"10_CR20","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1109\/40.977759","volume":"21","author":"R.B. Lee","year":"2001","unstructured":"Lee, R.B., Shi, Z., Yang, X.: Efficient permutation instructions for fast software cryptography. IEEE Micro.\u00a021(6), 56\u201369 (2001)","journal-title":"IEEE Micro."},{"key":"10_CR21","unstructured":"Luh, G.-C., Liu, W.W.: An immunological approach to mobile robot reactive navigation. Applied Soft Computing Journal (2006); 10.1016\/j.asoc.2006.10.009"},{"key":"10_CR22","unstructured":"Madisetti, V.V., Douglass, B.: The digital signal processing handbook. IEEE Press, CRC Press (1988)"},{"key":"10_CR23","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1046\/j.1365-3083.2001.00974.x","volume":"54","author":"P. Matzinger","year":"2001","unstructured":"Matzinger, P.: The danger model in its historical context. Scandinavian Journal of Immunology\u00a054, 4\u20139 (2001)","journal-title":"Scandinavian Journal of Immunology"},{"key":"10_CR24","volume-title":"Handbook of Applied cryptography","author":"A. Menezes","year":"1996","unstructured":"Menezes, A., van Oorschot, P., Vanstone, S.: Handbook of Applied cryptography. CRC Press, Inc., Boca Raton (1996)"},{"key":"10_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"112","DOI":"10.1007\/11536444_9","volume-title":"Artificial Immune Systems","author":"J. Twycross","year":"2005","unstructured":"Twycross, J., Aickelin, U.: Towards a conceptual framework for innate immunity. In: Jacob, C., Pilat, M.L., Bentley, P.J., Timmis, J.I. (eds.) ICARIS 2005. LNCS, vol.\u00a03627, pp. 112\u2013125. Springer, Heidelberg (2005)"}],"container-title":["Studies in Computational Intelligence","Software Engineering, Artificial Intelligence, Networking and Parallel\/Distributed Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-70560-4_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,31]],"date-time":"2025-01-31T21:43:59Z","timestamp":1738359839000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-540-70560-4_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540705598","9783540705604"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-70560-4_10","relation":{},"ISSN":["1860-949X","1860-9503"],"issn-type":[{"type":"print","value":"1860-949X"},{"type":"electronic","value":"1860-9503"}],"subject":[],"published":{"date-parts":[[2008]]}}}