{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,7]],"date-time":"2025-03-07T05:23:16Z","timestamp":1741324996657,"version":"3.38.0"},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642222023"},{"type":"electronic","value":"9783642222030"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-22203-0_38","type":"book-chapter","created":{"date-parts":[[2011,6,28]],"date-time":"2011-06-28T00:26:28Z","timestamp":1309220788000},"page":"429-442","source":"Crossref","is-referenced-by-count":9,"title":["Using Dendritic Cell Algorithm to Detect the Resource Consumption Attack over MANET"],"prefix":"10.1007","author":[{"given":"Maha","family":"Abdelhaq","sequence":"first","affiliation":[]},{"given":"Rosilah","family":"Hassan","sequence":"additional","affiliation":[]},{"given":"Raed","family":"Alsaqour","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"38_CR1","doi-asserted-by":"publisher","first-page":"991","DOI":"10.1146\/annurev.iy.12.040194.005015","volume":"12","author":"P. Matzinger","year":"1994","unstructured":"Matzinger, P.: Tolerance, Danger, and the Extended Family. Annual Review of Immunology\u00a012, 991\u20131045 (1994)","journal-title":"Annual Review of Immunology"},{"key":"38_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1007\/978-3-540-45192-1_15","volume-title":"Artificial Immune Systems","author":"U. Aickelin","year":"2003","unstructured":"Aickelin, U., Bentley, P., Cayzer, S., Kim, J., McLeod, J.: Danger Theory: The Link between AIS and IDS? In: Timmis, J., Bentley, P.J., Hart, E. (eds.) ICARIS 2003. LNCS, vol.\u00a02787, pp. 147\u2013155. Springer, Heidelberg (2003)"},{"key":"38_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1007\/11536444_12","volume-title":"Artificial Immune Systems","author":"J. Greensmith","year":"2005","unstructured":"Greensmith, J., Aickelin, U., Cayzer, S.: Introducing Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomaly Detection. In: Jacob, C., Pilat, M.L., Bentley, P.J., Timmis, J.I. (eds.) ICARIS 2005. LNCS, vol.\u00a03627, pp. 153\u2013167. Springer, Heidelberg (2005)"},{"key":"38_CR4","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1016\/j.inffus.2009.04.006","volume":"11","author":"J. Greensmith","year":"2010","unstructured":"Greensmith, J., Aickelin, U., Tedesco, G.: Information Fusion for Anomaly Detection with the Dendritic Cell Algorithm. Information Fusion\u00a011, 21\u201334 (2010)","journal-title":"Information Fusion"},{"key":"38_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"390","DOI":"10.1007\/11823940_30","volume-title":"Artificial Immune Systems","author":"J. Kim","year":"2006","unstructured":"Kim, J., Bentley, P.J., Wallenta, C., Ahmed, M., Hailes, S.: Danger Is Ubiquitous: Detecting Malicious Activities in Sensor Networks Using the Dendritic Cell Algorithm. In: Bersini, H., Carneiro, J. (eds.) ICARIS 2006. LNCS, vol.\u00a04163, pp. 390\u2013403. Springer, Heidelberg (2006)"},{"key":"38_CR6","doi-asserted-by":"crossref","unstructured":"Cayirci, E., Rong, C.: Security in Wireless Ad Hoc and Sensor Networks. Wiley, United Kingdom (2009)","DOI":"10.1002\/9780470516782"},{"key":"38_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1007\/11536444_9","volume-title":"Artificial Immune Systems","author":"J. Twycross","year":"2005","unstructured":"Twycross, J., Aickelin, U.: Towards a Conceptual Framework for Innate Immunity. In: Jacob, C., Pilat, M.L., Bentley, P.J., Timmis, J.I. (eds.) ICARIS 2005. LNCS, vol.\u00a03627, pp. 112\u2013125. Springer, Heidelberg (2005)"},{"key":"38_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"342","DOI":"10.1007\/978-3-540-30220-9_28","volume-title":"Artificial Immune Systems","author":"S. Sarafijanovic","year":"2004","unstructured":"Sarafijanovic, S., Le Boudec, J.Y.: An artificial immune system for misbehavior detection in mobile ad-hoc networks with virtual thymus, clustering, danger signal and memory detectors. In: Nicosia, G., Cutello, V., Bentley, P.J., Timmis, J. (eds.) ICARIS 2004. LNCS, vol.\u00a03239, pp. 342\u2013356. Springer, Heidelberg (2004)"},{"issue":"5","key":"38_CR9","doi-asserted-by":"publisher","first-page":"1076","DOI":"10.1109\/TNN.2005.853419","volume":"16","author":"S. Sarafijanovic","year":"2005","unstructured":"Sarafijanovic, S., Le Boudec, J.Y.: An artificial immune system approach with secondary response for misbehavior detection in mobile ad hoc networks. IEEE Transactions on Neural Networks\u00a016(5), 1076\u20131087 (2005)","journal-title":"IEEE Transactions on Neural Networks"},{"key":"38_CR10","first-page":"499","volume-title":"IEEE Congress on Evolutionary Computation (CEC 2006)","author":"J. Twycross","year":"2006","unstructured":"Twycross, J., Aickelin, U.: Libtissue - Implementing Innate Immunity. In: IEEE Congress on Evolutionary Computation (CEC 2006), pp. 499\u2013506. IEEE Press, New York (2006)"},{"key":"38_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"264","DOI":"10.1007\/978-3-642-14547-6_21","volume-title":"Artificial Immune Systems","author":"R. Fanelli","year":"2010","unstructured":"Fanelli, R.: Further experimentation with hybrid immune inspired network intrusion detection. In: Hart, E., McEwan, C., Timmis, J., Hone, A. (eds.) ICARIS 2010. LNCS, vol.\u00a06209, pp. 264\u2013275. Springer, Heidelberg (2010)"},{"key":"38_CR12","doi-asserted-by":"crossref","unstructured":"Drozda, M., Schaust, S., Szczerbicka, H.: Immuno-inspired Knowledge Management for Ad Hoc Wireless Networks. In: Szczerbicki, E., Nguyen, N.T. (eds.), pp. 1\u201326. Springer, Heidelberg (2010)","DOI":"10.1007\/978-3-642-04584-4_1"},{"key":"38_CR13","doi-asserted-by":"crossref","unstructured":"Marti, S., Giuli, T.J., Lai, K., Baker, M.: Mitigating routing misbehavior in mobile ad hoc networks. In: Proc. of International Conference on Mobile Computing and Networking, pp. 255\u2013265 (2005)","DOI":"10.1145\/345910.345955"},{"key":"38_CR14","first-page":"482","volume-title":"9th IEEE International Conference on Web Age Information Management","author":"D. Wang","year":"2008","unstructured":"Wang, D., Hu, M., Zhi, H.: A survey of Secure Routing in Ad Hoc Networks. In: 9th IEEE International Conference on Web Age Information Management, pp. 482\u2013486. IEEE Press, Zhangjiajie Hunan (2008)"},{"key":"38_CR15","doi-asserted-by":"crossref","unstructured":"Perkins, C.E., Royer, E.M.: Ad hoc On-Demand Distance Vector Routing. In: Proc. of the 2nd IEEE Workshop on Mobile Computing Systems and Applications, pp. 90\u2013100 (1999)","DOI":"10.1109\/MCSA.1999.749281"},{"key":"38_CR16","first-page":"279","volume":"1","author":"S. Taneja","year":"2010","unstructured":"Taneja, S., Kush, A.: A Survey of routing protocols in mobile ad hoc networks. international journal of innovation management and technology\u00a01, 279\u2013285 (2010)","journal-title":"international journal of innovation management and technology"},{"key":"38_CR17","first-page":"926","volume-title":"Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing","author":"A. Nadeem","year":"2009","unstructured":"Nadeem, A., Howarth, M.: Adaptive Intrusion Detection & Prevention of Denial of Service Attacks in MANETs. In: Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing, pp. 926\u2013930. ACM, New York (2009)"},{"key":"38_CR18","unstructured":"United States Government. NIAIDS. Understanding the Immune System, How It Works. NIH Publication No. 03-5423. U.S. National Institutes of Health (2003)"},{"key":"38_CR19","unstructured":"University of Tokyo, Japan, http:\/\/www.mcl.iis.u-tokyo.ac.jp\/eng_version\/index.html"}],"container-title":["Communications in Computer and Information Science","Software Engineering and Computer Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-22203-0_38","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,6]],"date-time":"2025-03-06T19:24:57Z","timestamp":1741289097000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-22203-0_38"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642222023","9783642222030"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-22203-0_38","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2011]]}}}