{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,12]],"date-time":"2025-02-12T09:40:13Z","timestamp":1739353213091,"version":"3.37.0"},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642049200"},{"type":"electronic","value":"9783642049217"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-04921-7_30","type":"book-chapter","created":{"date-parts":[[2009,9,22]],"date-time":"2009-09-22T11:46:25Z","timestamp":1253619985000},"page":"293-302","source":"Crossref","is-referenced-by-count":3,"title":["A Generative Model for Self\/Non-self Discrimination in Strings"],"prefix":"10.1007","author":[{"given":"Matti","family":"P\u00f6ll\u00e4","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"30_CR1","doi-asserted-by":"publisher","first-page":"202","DOI":"10.1109\/RISP.1994.296580","volume-title":"Proceedings of the 1994 IEEE Symposium on Research in Security and Privacy","author":"S. Forrest","year":"1994","unstructured":"Forrest, S., Perelson, A.S., Allen, L., Cherukuri, R.: Self-nonself discrimination in a computer. In: Proceedings of the 1994 IEEE Symposium on Research in Security and Privacy, Oakland, CA, pp. 202\u2013212. IEEE Computer Society Press, Los Alamitos (1994)"},{"key":"30_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"352","DOI":"10.1007\/978-3-540-85072-4_31","volume-title":"Artificial Immune Systems","author":"T. Stibor","year":"2008","unstructured":"Stibor, T.: An empirical study of self\/non-self discrimination in binary data with a kernel estimator. In: Bentley, P.J., Lee, D., Jung, S. (eds.) ICARIS 2008. LNCS, vol.\u00a05132, pp. 352\u2013363. Springer, Heidelberg (2008)"},{"key":"30_CR3","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/4175.001.0001","volume-title":"Learning with Kernels: Support Vector Machines, Regularization, Optimization, and Beyond","author":"B. Sch\u00f6lkopf","year":"2001","unstructured":"Sch\u00f6lkopf, B., Smola, A.J.: Learning with Kernels: Support Vector Machines, Regularization, Optimization, and Beyond. MIT Press, Cambridge (2001)"},{"key":"30_CR4","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1145\/1389095.1389113","volume-title":"Proceedings of Genetic and Evolutionary Computation Conference \u2013 GECCO","author":"T. Stibor","year":"2008","unstructured":"Stibor, T.: Discriminating self from non-self with finite mixtures of multivariate Bernoulli distributions. In: Proceedings of Genetic and Evolutionary Computation Conference \u2013 GECCO, pp. 127\u2013134. ACM Press, New York (2008)"},{"key":"30_CR5","unstructured":"P\u00f6ll\u00e4, M., Honkela, T.: Change detection of text documents using negative first-order statistics. In: Proceedings of AKRR 2008, The Second International and Interdisciplinary Conference on Adaptive Knowledge Representation and Reasoning, Porvoo, Finland, September 2008, pp. 48\u201355 (2008)"},{"key":"30_CR6","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1109\/CSFW.1996.503687","volume-title":"Proceedings of the 9th Computer Security Foundations Workshop","author":"P. D\u2019haeseleer","year":"1996","unstructured":"D\u2019haeseleer, P.: An immunological approach to change detection: theoretical results. In: Proceedings of the 9th Computer Security Foundations Workshop, pp. 18\u201326. IEEE Computer Society Press, Los Alamitos (1996)"},{"volume-title":"Artificial Immune Systems: A New Computational Intelligence Approach","year":"2002","key":"30_CR7","unstructured":"de Castro, L.N., Timmis, J. (eds.): Artificial Immune Systems: A New Computational Intelligence Approach. Springer, Heidelberg (2002)"},{"key":"30_CR8","doi-asserted-by":"crossref","unstructured":"Gonz\u00e1lez, F.A.: Anomaly detection using real-valued negative selection. Genetic programming and evolvable machines. Journal of Genetic Programming and Evolvable Machines, 4\u2013383 (2003)","DOI":"10.1023\/A:1026195112518"},{"key":"30_CR9","first-page":"491","volume-title":"Congress on Evolutionary Computation \u2013 CEC","author":"T. Stibor","year":"2006","unstructured":"Stibor, T., Timmis, J., Eckert, C.: The link between r-contiguous detectors and k-CNF satisfiability. In: Congress on Evolutionary Computation \u2013 CEC, pp. 491\u2013498. IEEE Press, Los Alamitos (2006); revised and extended version"},{"key":"30_CR10","first-page":"321","volume-title":"GECCO 2005: Proceedings of the 2005 conference on Genetic and evolutionary computation","author":"T. Stibor","year":"2005","unstructured":"Stibor, T., Mohr, P., Timmis, J., Eckert, C.: Is negative selection appropriate for anomaly detection? In: GECCO 2005: Proceedings of the 2005 conference on Genetic and evolutionary computation, pp. 321\u2013328. ACM, New York (2005)"},{"key":"30_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1007\/978-3-540-24854-5_31","volume-title":"Proceedings of Genetic and Evolutionary Computation Conference \u2013 GECCO-2004","author":"T. Stibor","year":"2004","unstructured":"Stibor, T., Bayarou, K.M., Eckert, C.: An investigation of R-chunk detector generation on higher alphabets. In: Deb, K., et al. (eds.) GECCO 2004. LNCS, vol.\u00a03102, pp. 299\u2013307. Springer, Heidelberg (2004)"},{"key":"30_CR12","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1111\/j.2517-6161.1977.tb01600.x","volume":"39","author":"A.P. Dempster","year":"1977","unstructured":"Dempster, A.P., Laird, N.M., Rubin, D.B.: Maximum-likelihood from incomplete data via the EM algorithm. Journal of Royal Statistical Society B\u00a039, 1\u201338 (1977)","journal-title":"Journal of Royal Statistical Society B"},{"key":"30_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"646","DOI":"10.1007\/978-3-540-44871-6_75","volume-title":"Pattern Recognition and Image Analysis","author":"J. Novovi\u010dov\u00e1","year":"2003","unstructured":"Novovi\u010dov\u00e1, J., Mal\u00edk, A.: Application of multinomial mixture model to text classification. In: Perales, F.J., Campilho, A.C., P\u00e9rez, N., Sanfeliu, A. (eds.) IbPRIA 2003. LNCS, vol.\u00a02652, pp. 646\u2013653. Springer, Heidelberg (2003)"},{"key":"30_CR14","unstructured":"Cavnar, W.B., Trenkle, J.M.: N-gram-based text categorization, pp. 161\u2013175 (1994)"},{"key":"30_CR15","unstructured":"Keselj, V., Peng, F., Cercone, N., Thomas, C.: N-gram-based author profiles for authorship attribution (2003)"},{"key":"30_CR16","first-page":"139","volume":"2","author":"L.M. Manevitz","year":"2001","unstructured":"Manevitz, L.M., Yousef, M.: One-class SVMs for document classification. Journal of Machine Learning Research\u00a02, 139\u2013154 (2001)","journal-title":"Journal of Machine Learning Research"},{"key":"30_CR17","series-title":"Lecture Notes in Computer Science","first-page":"489","volume-title":"Machine Learning: ECML 2004","author":"X.W.R. Srihari","year":"2004","unstructured":"Srihari, X.W.R., Zheng, Z.: Document representation for one-class SVM. In: Boulicaut, J.-F., Esposito, F., Giannotti, F., Pedreschi, D. (eds.) ECML 2004. LNCS, vol.\u00a03201, pp. 489\u2013500. Springer, Heidelberg (2004)"},{"key":"30_CR18","first-page":"993","volume":"3","author":"D.M. Blei","year":"2003","unstructured":"Blei, D.M., Ng, A.Y., Jordan, M.I.: Latent Dirichlet allocation. Journal of Machine Learning Research\u00a03, 993\u20131022 (2003)","journal-title":"Journal of Machine Learning Research"}],"container-title":["Lecture Notes in Computer Science","Adaptive and Natural Computing Algorithms"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-04921-7_30","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,12]],"date-time":"2025-02-12T08:46:28Z","timestamp":1739349988000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-04921-7_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642049200","9783642049217"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-04921-7_30","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}