{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T06:53:15Z","timestamp":1743144795597,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642223709"},{"type":"electronic","value":"9783642223716"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-22371-6_17","type":"book-chapter","created":{"date-parts":[[2011,7,4]],"date-time":"2011-07-04T09:03:50Z","timestamp":1309770230000},"page":"173-186","source":"Crossref","is-referenced-by-count":9,"title":["Quiet in Class: Classification, Noise and the Dendritic Cell Algorithm"],"prefix":"10.1007","author":[{"given":"Feng","family":"Gu","sequence":"first","affiliation":[]},{"given":"Jan","family":"Feyereisl","sequence":"additional","affiliation":[]},{"given":"Robert","family":"Oates","sequence":"additional","affiliation":[]},{"given":"Jenna","family":"Reps","sequence":"additional","affiliation":[]},{"given":"Julie","family":"Greensmith","sequence":"additional","affiliation":[]},{"given":"Uwe","family":"Aickelin","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"17_CR1","unstructured":"Aickelin, U., Cayzer, S., Bentley, P., Greensmith, J., Kim, J., Tedesco, G., Twycross, J.: The Danger Project (2010), http:\/\/ima.ac.uk\/danger"},{"key":"17_CR2","doi-asserted-by":"crossref","unstructured":"Al-Hammadi, Y.: Behavioural Correlation for Malicious Bot Detection. PhD thesis, School of Computer Science, University of Nottingham (2010)","DOI":"10.2139\/ssrn.2829290"},{"key":"17_CR3","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1023\/A:1009715923555","volume":"2","author":"C.J.C. Buerges","year":"1998","unstructured":"Buerges, C.J.C.: A Tutorial on Support Vector Mahinces for Pattern Recognition. Data Mining and Knowledge Discovery\u00a02, 121\u2013167 (1998)","journal-title":"Data Mining and Knowledge Discovery"},{"key":"17_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1007\/978-3-642-14547-6_9","volume-title":"Artificial Immune Systems","author":"Z. Chelly","year":"2010","unstructured":"Chelly, Z., Elouedi, Z.: FDCM: A fuzzy dendritic cell method. In: Hart, E., McEwan, C., Timmis, J., Hone, A. (eds.) ICARIS 2010. LNCS, vol.\u00a06209, pp. 102\u2013115. Springer, Heidelberg (2010)"},{"key":"17_CR5","doi-asserted-by":"crossref","unstructured":"Crawley, M.J.: Statistics: An Introduction Using R. Wiley Blackwell (2005)","DOI":"10.1002\/9781119941750"},{"key":"17_CR6","unstructured":"Duda, R.O., Hart, P.E., Stork, D.G.: Pattern Classification, 2nd edn. Wiley-Blackwell (2000)"},{"key":"17_CR7","volume-title":"Practical Methods of Optimization","author":"R. Fletcher","year":"1987","unstructured":"Fletcher, R.: Practical Methods of Optimization. John Wiley and Sons, West Sussex (1987)"},{"issue":"12","key":"17_CR8","doi-asserted-by":"publisher","first-page":"1963","DOI":"10.1109\/TNN.2010.2080319","volume":"21","author":"Z.Y. Fu","year":"2010","unstructured":"Fu, Z.Y., Robles-Kelly, A., Zhou, J.: Mixing Linear SVMs for Nonlinear Classification. IEEE Transactions on Neural Networks\u00a021(12), 1963\u20131975 (2010)","journal-title":"IEEE Transactions on Neural Networks"},{"key":"17_CR9","unstructured":"Greensmith, J.: The Dendritic Cell Algorithm. PhD thesis, School of Computer Science, University of Nottingham (2007)"},{"key":"17_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1007\/978-3-540-85072-4_26","volume-title":"Artificial Immune Systems","author":"J. Greensmith","year":"2008","unstructured":"Greensmith, J., Aickelin, U.: The deterministic dendritic cell algorithm. In: Bentley, P.J., Lee, D., Jung, S. (eds.) ICARIS 2008. LNCS, vol.\u00a05132, pp. 291\u2013302. Springer, Heidelberg (2008)"},{"key":"17_CR11","unstructured":"Gu, F., Feyereisl, J., Oates, R., Reps, J., Greensmith, J., Aickelin, U.: Documentation of ICARIS 2011 paper (raw data, experimental results and statistical analysis) (2011), http:\/\/www.cs.nott.ac.uk\/~fxg\/icaris_paper2011.html"},{"key":"17_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1007\/978-3-642-03246-2_10","volume-title":"Artificial Immune Systems","author":"F. Gu","year":"2009","unstructured":"Gu, F., Greensmith, J., Aickelin, U.: Exploration of the dendritic cell algorithm using the duration calculus. In: Andrews, P.S., Timmis, J., Owens, N.D.L., Aickelin, U., Hart, E., Hone, A., Tyrrell, A.M. (eds.) ICARIS 2009. LNCS, vol.\u00a05666, pp. 54\u201366. Springer, Heidelberg (2009)"},{"key":"17_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1007\/978-3-540-85072-4_27","volume-title":"Artificial Immune Systems","author":"T.S. Guzella","year":"2008","unstructured":"Guzella, T.S., Mota-Santos, T.A., Caminhas, W.M.: Artificial immune systems and kernel methods. In: Bentley, P.J., Lee, D., Jung, S. (eds.) ICARIS 2008. LNCS, vol.\u00a05132, pp. 303\u2013315. Springer, Heidelberg (2008)"},{"key":"17_CR14","volume-title":"Digital Signal Processing: A Practical Approach","author":"E. Ifeachor","year":"2001","unstructured":"Ifeachor, E., Jervis, P.B.: Digital Signal Processing: A Practical Approach, 2nd edn. Prentice Hall, Englewood Cliffs (2001)","edition":"2"},{"key":"17_CR15","unstructured":"Karatzoglou, A., Smola, A., Hornik, K.: Kernel-based machine learning lab. Technical report, Department of Statistics and Probability Theory, Vienna University of Technology (2011)"},{"key":"17_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1007\/978-3-642-14547-6_8","volume-title":"Artificial Immune Systems","author":"C..J. Musselle","year":"2010","unstructured":"Musselle, C.J.: Insights into the antigen sampling component of the dendritic cell algorithm. In: Hart, E., McEwan, C., Timmis, J., Hone, A. (eds.) ICARIS 2010. LNCS, vol.\u00a06209, pp. 88\u2013101. Springer, Heidelberg (2010)"},{"key":"17_CR17","unstructured":"Oates, R.: The Suitability of the Dendritic Cell Algorithm for Robotic Security Applications. PhD thesis, School of Computer Science, University of Nottingham (2010)"},{"issue":"2","key":"17_CR18","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1007\/s12065-008-0011-y","volume":"1","author":"R. Oates","year":"2008","unstructured":"Oates, R., Kendall, G., Garibaldi, J.: Frequency Analysis for Dendritic Cell Population Tuning: Decimating the Dendritic Cell. Evolutionary Intelligence\u00a01(2), 145\u2013157 (2008)","journal-title":"Evolutionary Intelligence"},{"key":"17_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"328","DOI":"10.1007\/978-3-540-85072-4_29","volume-title":"Artificial Immune Systems","author":"R. Oates","year":"2008","unstructured":"Oates, R., Kendall, G., Garibaldi, J.M.: The limitations of frequency analysis for dendritic cell population modelling. In: Bentley, P.J., Lee, D., Jung, S. (eds.) ICARIS 2008. LNCS, vol.\u00a05132, pp. 328\u2013339. Springer, Heidelberg (2008)"},{"key":"17_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1007\/978-3-642-14547-6_7","volume-title":"Artificial Immune Systems","author":"R. Oates","year":"2010","unstructured":"Oates, R., Kendall, G., Garibaldi, J.M.: Classifying in the presence of uncertainty: A DCA perspective. In: Hart, E., McEwan, C., Timmis, J., Hone, A. (eds.) ICARIS 2010. LNCS, vol.\u00a06209, pp. 75\u201387. Springer, Heidelberg (2010)"},{"key":"17_CR21","volume-title":"Learning with Kernels : Support Vector Machines, Regularization, Optimization, and Beyond","author":"B. Scholkopf","year":"2002","unstructured":"Scholkopf, B., Smola, A.J.: Learning with Kernels: Support Vector Machines, Regularization, Optimization, and Beyond. MIT Press, Cambridge (2002)"},{"key":"17_CR22","doi-asserted-by":"crossref","unstructured":"Stibor, T., Oates, R., Kendall, G., Garibaldi, J.: Geometrical insights into the dendritic cell algorithm. In: Proceedings of the Genetic and Evolutionary Computation Conference (GECCO), pp. 1275\u20131282 (2009)","DOI":"10.1145\/1569901.1570072"}],"container-title":["Lecture Notes in Computer Science","Artificial Immune Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-22371-6_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,12]],"date-time":"2019-06-12T13:40:40Z","timestamp":1560346840000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-22371-6_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642223709","9783642223716"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-22371-6_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}