{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T06:41:08Z","timestamp":1725518468989},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540858607"},{"type":"electronic","value":"9783540858614"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-85861-4_8","type":"book-chapter","created":{"date-parts":[[2008,9,12]],"date-time":"2008-09-12T14:07:26Z","timestamp":1221228446000},"page":"60-67","source":"Crossref","is-referenced-by-count":4,"title":["TAT-NIDS: An Immune-Based Anomaly Detection Architecture for Network Intrusion Detection"],"prefix":"10.1007","author":[{"given":"M\u00e1rio","family":"Antunes","sequence":"first","affiliation":[]},{"given":"Manuel","family":"Correia","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"8_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1007\/978-3-540-45192-1_15","volume-title":"Artificial Immune Systems","author":"U. Aickelin","year":"2003","unstructured":"Aickelin, U., Bentley, P., Cayzer, S., Kim, J., McLeod, J.: Danger theory: The link between ais and ids? In: Timmis, J., Bentley, P.J., Hart, E. (eds.) ICARIS 2003. LNCS, vol.\u00a02787, pp. 147\u2013155. Springer, Heidelberg (2003)"},{"key":"8_CR2","doi-asserted-by":"crossref","unstructured":"Beale, J., Caswell, B.: Snort 2.1 Intrusion Detection. Syngress (2004)","DOI":"10.1016\/B978-193183604-3\/50006-0"},{"key":"8_CR3","doi-asserted-by":"crossref","unstructured":"Burmester, G.R., Pezzuto, A.: Color Atlas of Immunology. Thieme Medical Publishers (2003)","DOI":"10.1055\/b-005-148845"},{"key":"8_CR4","doi-asserted-by":"crossref","unstructured":"Burnet, F.M.: The Clonal Selection Theory of Acquired Immunity. Vanderbilt University Press (1959)","DOI":"10.5962\/bhl.title.8281"},{"issue":"1","key":"8_CR5","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1016\/j.cam.2004.10.025","volume":"184","author":"J. Carneiro","year":"2005","unstructured":"Carneiro, J., Paix\u00e3o, T., Milutinovic, D., Sousa, J., Leon, K., Gardner, R., Faro, J.: Immunological self-tolerance: Lessons from mathematical modeling. Journal of Computational and Applied Mathematics\u00a0184(1), 77\u2013100 (2005)","journal-title":"Journal of Computational and Applied Mathematics"},{"key":"8_CR6","volume-title":"Artificial Immune Systems: A New Computational Intelligence Approach","author":"L.N. Castro de","year":"2002","unstructured":"de Castro, L.N., Timmis, J.: Artificial Immune Systems: A New Computational Intelligence Approach. Springer, Heidelberg (2002)"},{"key":"8_CR7","doi-asserted-by":"crossref","unstructured":"Forrest, S., Perelson, A.S., Allen, L., Cherukuri, R.: Self-nonself discrimination in a computer. In: Proceedings of the 1994 IEEE Symposium on Research in Security and Privacy, pp. 201\u2013212 (1994)","DOI":"10.1109\/RISP.1994.296580"},{"key":"8_CR8","doi-asserted-by":"crossref","unstructured":"Grossman, Z., Singer, A.: Tuning of activation thresholds explains flexibility in the selection and development of t cells in the thymus (1996)","DOI":"10.1073\/pnas.93.25.14747"},{"key":"8_CR9","unstructured":"Kim, J., Bentley, P.: An evaluation of negative selection in an artificial immune system for network intrusion detection. In: Genetic and Evolutionary Computation Conference 2001, pp. 1330\u20131337 (2001)"},{"key":"8_CR10","doi-asserted-by":"crossref","unstructured":"Kim, J., Bentley, P., Aickelin, U., Greensmith, J., Tedesco, G., Twycross, J.: Immune system approaches to intrusion detection - a review. Natural computing (2007)","DOI":"10.1007\/s11047-006-9026-4"},{"issue":"5566","key":"8_CR11","first-page":"301","volume":"296","author":"P. Matzinger","year":"2002","unstructured":"Matzinger, P.: The Danger Model: A Renewed Sense of Self. Science\u2019s STKE\u00a0296(5566), 301\u2013305 (2002)","journal-title":"Science\u2019s STKE"},{"key":"8_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1007\/978-3-540-74446-7_21","volume-title":"Engineering Stochastic Local Search Algorithms. Designing, Implementing and Analyzing Effective Heuristics","author":"J.P. Pedroso","year":"2007","unstructured":"Pedroso, J.P.: Simple Metaheuristics Using the Simplex Algorithm for Non-linear Programming. In: St\u00fctzle, T., Birattari, M., H. Hoos, H. (eds.) SLS 2007. LNCS, vol.\u00a04638, p. 217. Springer, Heidelberg (2007)"},{"key":"8_CR13","doi-asserted-by":"crossref","unstructured":"Stibor, T., Timmis, J., Eckert, C.: On the appropriateness of negative selection defined over hamming shape-space as a network intrusion detection system. The 2005 IEEE Congress on Evolutionary Computation\u00a02 (2005)","DOI":"10.1109\/CEC.2005.1554799"},{"key":"8_CR14","doi-asserted-by":"crossref","first-page":"1725","DOI":"10.4049\/jimmunol.165.4.1725","volume":"165","author":"R.E. Vance","year":"2000","unstructured":"Vance, R.E.: Cutting edge commentary: A copernican revolution? doubts about the dangertheory. The Journal of Immunology\u00a0165, 1725\u20131728 (2000)","journal-title":"The Journal of Immunology"}],"container-title":["Advances in Soft Computing","2nd International Workshop on Practical Applications of Computational Biology and Bioinformatics (IWPACBB 2008)"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-85861-4_8.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T02:35:27Z","timestamp":1606185327000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-85861-4_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540858607","9783540858614"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-85861-4_8","relation":{},"ISSN":["1615-3871","1860-0794"],"issn-type":[{"type":"print","value":"1615-3871"},{"type":"electronic","value":"1860-0794"}],"subject":[]}}