{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T18:41:18Z","timestamp":1743014478799,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642223709"},{"type":"electronic","value":"9783642223716"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-22371-6_29","type":"book-chapter","created":{"date-parts":[[2011,7,4]],"date-time":"2011-07-04T09:03:50Z","timestamp":1309770230000},"page":"334-347","source":"Crossref","is-referenced-by-count":2,"title":["Tunable Immune Detectors for Behaviour-Based Network Intrusion Detection"],"prefix":"10.1007","author":[{"given":"M\u00e1rio","family":"Antunes","sequence":"first","affiliation":[]},{"given":"Manuel E.","family":"Correia","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"29_CR1","volume-title":"Tending Adam\u2019s Garden: evolving the cognitive immune self","author":"I. Cohen","year":"2000","unstructured":"Cohen, I.: Tending Adam\u2019s Garden: evolving the cognitive immune self. Academic Press, San Diego (2000)"},{"key":"29_CR2","volume-title":"Artificial Immune Systems: A New Computational Intelligence Approach","author":"L. Castro","year":"2002","unstructured":"Castro, L., Timmis, J.: Artificial Immune Systems: A New Computational Intelligence Approach. Springer, Heidelberg (2002)"},{"key":"29_CR3","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-39241-7","volume-title":"In silico immunology","author":"D. Flower","year":"2007","unstructured":"Flower, D., Timmis, J.: In silico immunology. Springer, Heidelberg (2007)"},{"issue":"4","key":"29_CR4","doi-asserted-by":"publisher","first-page":"413","DOI":"10.1007\/s11047-006-9026-4","volume":"6","author":"J. Kim","year":"2007","unstructured":"Kim, J., Bentley, P., Aickelin, U., Greensmith, J., Tedesco, G., Twycross, J.: Immune system approaches to intrusion detection - a review. Journal of Natural Computing\u00a06(4), 413\u2013466 (2007)","journal-title":"Journal of Natural Computing"},{"key":"29_CR5","doi-asserted-by":"publisher","first-page":"1574","DOI":"10.1016\/j.asoc.2010.08.024","volume":"11","author":"D. Dasgupta","year":"2010","unstructured":"Dasgupta, D., Yu, S., Nino, F.: Recent Advances in AIS: Models and Applications. J. Applied Soft. Computing\u00a011, 1574\u20131587 (2010)","journal-title":"J. Applied Soft. Computing"},{"issue":"21","key":"29_CR6","doi-asserted-by":"publisher","first-page":"10365","DOI":"10.1073\/pnas.89.21.10365","volume":"89","author":"Z. Grossman","year":"1992","unstructured":"Grossman, Z., Paul, W.: Adaptive cellular interactions in the immune system: The tunable activation threshold and the significance of subthreshold responses. National Academy of Sciences\u00a089(21), 10365\u201310369 (1992)","journal-title":"National Academy of Sciences"},{"issue":"1","key":"29_CR7","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1016\/j.cam.2004.10.025","volume":"184","author":"J. Carneiro","year":"2005","unstructured":"Carneiro, J., Paix\u00e3o, T., Milutinovic, D., Sousa, J., Leon, K., Gardner, R., Faro, J.: Immunological self-tolerance: Lessons from mathematical modeling. Journal of Computational and Applied Mathematics\u00a0184(1), 77\u2013100 (2005)","journal-title":"Journal of Computational and Applied Mathematics"},{"key":"29_CR8","doi-asserted-by":"crossref","unstructured":"Antunes, M., Correia, M.: TAT-NIDS: an immune-based anomaly detection architecture for network intrusion detection. In: Proceedings of IWPACBB, Advances in Intelligent and Soft. Computing, vol.\u00a049, pp. 60\u201367 (2008)","DOI":"10.1007\/978-3-540-85861-4_8"},{"key":"29_CR9","first-page":"103","volume":"3","author":"P. Andrews","year":"2010","unstructured":"Andrews, P., Timmis, J.: Tunable Detectors for Artificial Immune Systems: From Model to Algorithm. Bioinformatics for Immunomics (Ed. Springer)\u00a03, 103\u2013127 (2010)","journal-title":"Bioinformatics for Immunomics (Ed. Springer)"},{"key":"29_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"376","DOI":"10.1007\/978-3-540-85072-4_33","volume-title":"Artificial Immune Systems","author":"P.S. Andrews","year":"2008","unstructured":"Andrews, P.S., Timmis, J.: Adaptable lymphocytes for artificial immune systems. In: Bentley, P.J., Lee, D., Jung, S. (eds.) ICARIS 2008. LNCS, vol.\u00a05132, pp. 376\u2013386. Springer, Heidelberg (2008)"},{"key":"29_CR11","unstructured":"Caswell, B., Beale, J.: Snort Intrusion Detection and Prevention Toolkit. Syngress Press (2007)"},{"key":"29_CR12","volume-title":"LNICST","author":"M. Antunes","year":"2010","unstructured":"Antunes, M., Correia, M.: Self tolerance by tuning t-cell activation: an artificial immune system for anomaly detection. In: LNICST, Springer, Heidelberg (2010)"},{"issue":"1","key":"29_CR13","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1016\/S0951-8320(03)00058-9","volume":"81","author":"J. Helton","year":"2003","unstructured":"Helton, J., Davis, F.: Latin hypercube sampling and the propagation of uncertainty in analyses of complex systems. Reliability Engineering and System Safety\u00a081(1), 23\u201369 (2003)","journal-title":"Reliability Engineering and System Safety"},{"key":"29_CR14","doi-asserted-by":"publisher","first-page":"579","DOI":"10.1016\/S1389-1286(00)00139-0","volume":"34","author":"R. Lippmann","year":"2000","unstructured":"Lippmann, R., Haines, J., Fried, D., Korba, J., Das, K.: The 1999 DARPA off-line intrusion detection evaluation. Computer Networks\u00a034, 579\u2013595 (2000)","journal-title":"Computer Networks"},{"issue":"4","key":"29_CR15","doi-asserted-by":"publisher","first-page":"262","DOI":"10.1145\/382912.382923","volume":"3","author":"J. McHugh","year":"2000","unstructured":"McHugh, J.: Testing intrusion detection systems: A critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory. ACM Transactions on Information and System Security\u00a03(4), 262\u2013294 (2000)","journal-title":"ACM Transactions on Information and System Security"},{"key":"29_CR16","first-page":"361","volume-title":"Proceedings of ACSAC","author":"F. Massicotte","year":"2006","unstructured":"Massicotte, F., Gagnon, F., Labiche, Y., Briand, L., Couture, M.: Automatic evaluation of intrusion detection systems. In: Proceedings of ACSAC, pp. 361\u2013370. IEEE, Los Alamitos (2006)"},{"key":"29_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"342","DOI":"10.1007\/978-3-642-20267-4_36","volume-title":"Adaptive and Natural Computing Algorithms","author":"M. Antunes","year":"2011","unstructured":"Antunes, M., Silva, C., Ribeiro, B., Correia, M.: A hybrid ais-svm ensemble approach for text classification. In: Dobnikar, A., Lotri\u010d, U., \u0160ter, B. (eds.) ICANNGA 2011, Part II. LNCS, vol.\u00a06594, pp. 342\u2013352. Springer, Heidelberg (2011)"}],"container-title":["Lecture Notes in Computer Science","Artificial Immune Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-22371-6_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,12]],"date-time":"2019-06-12T13:40:32Z","timestamp":1560346832000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-22371-6_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642223709","9783642223716"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-22371-6_29","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}