{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:51:43Z","timestamp":1725551503570},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642122415"},{"type":"electronic","value":"9783642122422"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-12242-2_17","type":"book-chapter","created":{"date-parts":[[2010,3,31]],"date-time":"2010-03-31T13:12:14Z","timestamp":1270041134000},"page":"161-170","source":"Crossref","is-referenced-by-count":1,"title":["A Study of Nature-Inspired Methods for Financial Trend Reversal Detection"],"prefix":"10.1007","author":[{"given":"Antonia","family":"Azzini","sequence":"first","affiliation":[]},{"given":"Matteo","family":"De Felice","sequence":"additional","affiliation":[]},{"given":"Andrea G. B.","family":"Tettamanzi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"17_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1007\/978-3-642-01129-0_12","volume-title":"EvoWorkshops 2009","author":"A. Azzini","year":"2009","unstructured":"Azzini, A., De Felice, M., Meloni, S., Tettamanzi, A.G.B.: Soft computing techniques for Internet backbone traffic anomaly detection. In: Giacobini, M., et al. (eds.) EvoWorkshops 2009. LNCS, vol.\u00a05484, pp. 99\u2013104. Springer, Heidelberg (2009)"},{"key":"17_CR2","doi-asserted-by":"crossref","unstructured":"Balachandran, S., Dasgupta, D., Nino, F., Garrett, D.: A framework for evolving multi-shaped detectors in negative selection. In: Proc. of IEEE Symposium on Foundations of Computational Intelligence, FOCI 2007, pp. 401\u2013408 (2007)","DOI":"10.1109\/FOCI.2007.371503"},{"key":"17_CR3","doi-asserted-by":"crossref","DOI":"10.1093\/oso\/9780195131581.001.0001","volume-title":"Swarm intelligence: From natural to artificial systems","author":"E. Bonabeau","year":"1999","unstructured":"Bonabeau, E., Dorigo, M., Theraulaz, G.: Swarm intelligence: From natural to artificial systems. Oxford University Press, Oxford (1999)"},{"key":"17_CR4","doi-asserted-by":"publisher","first-page":"740","DOI":"10.1016\/j.comcom.2006.08.016","volume":"30","author":"P. Bouvry","year":"2007","unstructured":"Bouvry, P., Seredynsky, F.: Anomaly detection in TCP\/IP networks using immune systems paradigm. Computer Comm.\u00a030, 740\u2013749 (2007)","journal-title":"Computer Comm."},{"key":"17_CR5","volume-title":"The Encyclopedia of Technical Market Indicators","author":"R. Colby","year":"2002","unstructured":"Colby, R.: The Encyclopedia of Technical Market Indicators, 2nd edn. McGraw-Hill, New York (2002)","edition":"2"},{"key":"17_CR6","series-title":"Lecture Notes in Computer Science","first-page":"287","volume-title":"Genetic and Evolutionary Computation \u2013 GECCO 2004","author":"D. Dasgupta","year":"2004","unstructured":"Dasgupta, D., Ji, Z.: Real-valued negative selection algorithm with variable-sized detectors. In: Deb, K., et al. (eds.) GECCO 2004. LNCS, vol.\u00a03102, pp. 287\u2013298. Springer, Heidelberg (2004)"},{"issue":"3","key":"17_CR7","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1109\/TEVC.2002.1011539","volume":"6","author":"N.L. Castro De","year":"2002","unstructured":"De Castro, N.L., von Zuben, F.J.: Learning and optimization using the clonal selection principle. IEEE Trans. on Evolutionary Computation\u00a06(3), 239\u2013251 (2002)","journal-title":"IEEE Trans. on Evolutionary Computation"},{"key":"17_CR8","doi-asserted-by":"crossref","unstructured":"Forrest, S., Perelson, A., Allen, L., Cherukuri, R.: Self-nonself discrimination in a computer. In: Proc. of the IEEE Symposium on Research in Security and Privacy, Los Alamitos, CA, pp. 202\u2013212 (1994)","DOI":"10.1109\/RISP.1994.296580"},{"key":"17_CR9","doi-asserted-by":"crossref","unstructured":"Freitas, A.A., Timmis, J.: Revisiting the Foundations of Artificial Immune Sustems for Data Mining. Trans. on Evolutionary Computation\u00a011(4) (August 2007)","DOI":"10.1109\/TEVC.2006.884042"},{"key":"17_CR10","volume-title":"Analyzing and Forecasting Futures Prices","author":"A. Herbst","year":"1992","unstructured":"Herbst, A.: Analyzing and Forecasting Futures Prices. Wiley, New York (1992)"},{"key":"17_CR11","volume-title":"Chaos and Order in the Capital Markets","author":"E. Peters","year":"1996","unstructured":"Peters, E.: Chaos and Order in the Capital Markets, 2nd edn. Wiley, New York (1996)","edition":"2"},{"key":"17_CR12","doi-asserted-by":"crossref","unstructured":"Kennedy, J., Eberhart, R.: Particle swarm optimization. In: Proc. of IEEE International Conf. on Neural Networks, Perth, Australia, vol.\u00a04, pp. 1942\u20131948 (1995)","DOI":"10.1109\/ICNN.1995.488968"},{"key":"17_CR13","doi-asserted-by":"publisher","first-page":"413","DOI":"10.1007\/s11047-006-9026-4","volume":"6","author":"J. Kim","year":"2007","unstructured":"Kim, J., Bentley, P.J., Aickelin, U., Greensmith, J., Tedesco, G., Twycross, J.: Immune system approaches to intrusion detection - a review. Natural Computing\u00a06, 413\u2013466 (2007)","journal-title":"Natural Computing"},{"key":"17_CR14","volume-title":"The Handbook of Portfolio Mathematics: Formulas for optimal allocation & leverage","author":"R. Vince","year":"2007","unstructured":"Vince, R.: The Handbook of Portfolio Mathematics: Formulas for optimal allocation & leverage. Wiley, New York (2007)"}],"container-title":["Lecture Notes in Computer Science","Applications of Evolutionary Computation"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-12242-2_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,25]],"date-time":"2021-10-25T07:30:05Z","timestamp":1635147005000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-12242-2_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642122415","9783642122422"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-12242-2_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}