{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T02:25:28Z","timestamp":1743128728941,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642223709"},{"type":"electronic","value":"9783642223716"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-22371-6_33","type":"book-chapter","created":{"date-parts":[[2011,7,4]],"date-time":"2011-07-04T13:03:50Z","timestamp":1309784630000},"page":"383-394","source":"Crossref","is-referenced-by-count":2,"title":["Towards an Artificial Immune System for Online Fraud Detection"],"prefix":"10.1007","author":[{"given":"Rentian","family":"Huang","sequence":"first","affiliation":[]},{"given":"Hissam","family":"Tawfik","sequence":"additional","affiliation":[]},{"given":"Atulya","family":"Nagar","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"33_CR1","doi-asserted-by":"crossref","unstructured":"Satti, M.M., Gamer, B.J., Nagrial, M.H.: Information security standard for E businesses. In: Proc. 8th Intl. Conf. on Commun. System, vol.\u00a02, pp. 641\u2013645 (2008)","DOI":"10.1109\/ICCS.2002.1183205"},{"key":"33_CR2","doi-asserted-by":"publisher","DOI":"10.1145\/1655028.1655044","volume-title":"Using Identity Credential Usage Logs to Detect Anomalous Service Accesses","author":"D. Mashima","year":"2009","unstructured":"Mashima, D., Ahamad, M.: Using Identity Credential Usage Logs to Detect Anomalous Service Accesses. DIM, Chicago (2009)"},{"key":"33_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1007\/3-540-45474-8_8","volume-title":"Recent Advances in Intrusion Detection","author":"P.D. Williams","year":"2001","unstructured":"Williams, P.D., Anchor, K.P., Bebo, J.L., Gunsch, G.H., Lamont, G.D.: CDIS: Towards a Computer Immune System for Detecting Network Intrusions. In: Lee, W., M\u00e9, L., Wespi, A. (eds.) RAID 2001. LNCS, vol.\u00a02212, pp. 117\u2013133. Springer, Heidelberg (2001)"},{"key":"33_CR4","series-title":"Lecture Notes in Computer Science","first-page":"664","volume-title":"Entertainment Computing - ICEC 2006","author":"J. Greensmith","year":"2006","unstructured":"Greensmith, J., Twycross, J., Aickelin, U.: Dendritic cells for anomaly detection. In: Harper, R., Rauterberg, M., Combetto, M. (eds.) ICEC 2006. LNCS, vol.\u00a04161, pp. 664\u2013671. Springer, Heidelberg (2006)"},{"issue":"1","key":"33_CR5","first-page":"45","volume":"7","author":"S.A. Hofmeyr","year":"2000","unstructured":"Hofmeyr, S.A., Forrest, S.: Architecture for an artificial immune system. Evolutionary Computation\u00a07(1), 45\u201368 (2000)","journal-title":"Evolutionary Computation"},{"key":"33_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1007\/978-3-540-85072-4_8","volume-title":"Artificial Immune Systems","author":"P. Cort\u00e9s","year":"2008","unstructured":"Cort\u00e9s, P., Garc\u00eda, J.M., Onieva, L., Mu\u00f1uzuri, J., Guadix, J.: Viral System to Solve Optimization Problems: An Immune-Inspired Computational Intelligence Approach. In: Bentley, P.J., Lee, D., Jung, S. (eds.) ICARIS 2008. LNCS, vol.\u00a05132, pp. 83\u201394. Springer, Heidelberg (2008)"},{"key":"33_CR7","series-title":"Lecture Notes in Computer Science","first-page":"49","volume-title":"Proceeding of The 7th International Conference on Artificial Immune Systems","author":"P.A.D. Castro","year":"2008","unstructured":"Castro, P.A.D., Zuben, F.J.Von.: Mobais: a Bayesian Artificial Immune System for Multi-Objective Optimization. In: Bentley, P.J., Lee, D., Jung, S. (eds.) ICARIS 2008. LNCS, vol.\u00a05132, pp. 49\u201359. Springer, Heidelberg (2008)"},{"key":"33_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"204","DOI":"10.1007\/978-3-540-73922-7_18","volume-title":"Artificial Immune Systems","author":"R. Oates","year":"2007","unstructured":"Oates, R., Greensmith, J., Aickelin, U., Garibaldi, J., Kendall, G.: The application of a dendritic cell algorithm to a robotic classifier. In: de Castro, L.N., Von Zuben, F.J., Knidel, H. (eds.) ICARIS 2007. LNCS, vol.\u00a04628, pp. 204\u2013215. Springer, Heidelberg (2007)"},{"key":"33_CR9","unstructured":"Qiang, C., Xiangpin, L., Chuang, X.: A Model for Detection and Diagnosis of Fault Based on Artificial Immune Theory. Journal of Southern Institute of Memallurgy\u00a0126(3) (2005)"},{"key":"33_CR10","doi-asserted-by":"crossref","unstructured":"Tuo, J., Ren, S., Liu, W., Li, X., Li, B., Lei, L.: Artificial Immune System for Fraud Detection. In: proceeding of IEEE International Conference on Systems, Man and Cybernetics, pp. 1407\u20131411 (2004)","DOI":"10.1109\/ICSMC.2004.1399827"},{"key":"33_CR11","doi-asserted-by":"crossref","unstructured":"Huang, R., Tawfik, H., NagaRentian, A.: Artificial Dendritic Cells Algorithm for Online Break-in Fraud Detection. In: Proceeding of International Conference on Developments in eSystems Engineering, Abu Dhabi, UAE, pp. 181\u2013189 (2009)","DOI":"10.1109\/DeSE.2009.59"},{"key":"33_CR12","doi-asserted-by":"crossref","unstructured":"Huang, R., Tawfik, H., Nagar, A.: Electronic Fraud Detection for Video-on-Demand System Using Hybrid Immunology-Inspired Algorithms. In: Proceeding of The 9th International Conference on Artificial Immune Systems, Edinburgh, UK, pp. 290\u2013303 (2010)","DOI":"10.1007\/978-3-642-14547-6_23"},{"key":"33_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1007\/978-3-540-85072-4_11","volume-title":"Artificial Immune Systems","author":"M.F.A. Gadi","year":"2008","unstructured":"Gadi, M.F.A., Wang, X., do Lago, A.P.: Credit Card Fraud Detection with Artificial Immune System. In: Bentley, P.J., Lee, D., Jung, S. (eds.) ICARIS 2008. LNCS, vol.\u00a05132, pp. 119\u2013131. Springer, Heidelberg (2008)"},{"key":"33_CR14","series-title":"Lecture Notes in Computer Science","volume-title":"Entertainment Computing - ICEC 2010","author":"A. Brabazon","year":"2010","unstructured":"Brabazon, A., Cahill, J., Keenan, P., Walsh, D.: Identifying online credit card fraud using artificial immune systems. In: Yang, H.S., Malaka, R., Hoshino, J., Han, J.H. (eds.) ICEC 2010. LNCS, vol.\u00a06243. Springer, Heidelberg (2010)"},{"key":"33_CR15","unstructured":"Timmis, J., Tyrrell, A., Mokhtar, M., Ismail, A.R., owen, N., Bi, R.: An Artificial Immune System for Robot Organisms. Adaptive Control Mechanisms, 279\u2013302 (2010)"},{"key":"33_CR16","unstructured":"De Castro, L.N., Von Zuben, F.J.: The clonal selection algorithm with engineering applications. In: Proceedings of GECCO 2000. Workshop on Artificial Immune Systems and Their Applications. 36\u201337 (2000)"},{"key":"33_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1007\/978-3-540-85072-4_25","volume-title":"Artificial Immune Systems","author":"S. Yu","year":"2008","unstructured":"Yu, S., Dasgupta, D.: Conserved Self Pattern Recognition Algorithm. In: Bentley, P.J., Lee, D., Jung, S. (eds.) ICARIS 2008. LNCS, vol.\u00a05132, pp. 279\u2013290. Springer, Heidelberg (2008)"},{"key":"33_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1007\/978-3-642-03246-2_15","volume-title":"Artificial Immune Systems","author":"N. Owens","year":"2009","unstructured":"Owens, N., Greensted, A., Timmis, J., Tyrrell, A.: T cell receptor signalling inspired kernel density estimation and anomaly detection. In: Andrews, P.S., Timmis, J., Owens, N.D.L., Aickelin, U., Hart, E., Hone, A., Tyrrell, A.M. (eds.) ICARIS 2009. LNCS, vol.\u00a05666, pp. 122\u2013135. Springer, Heidelberg (2009)"},{"key":"33_CR19","first-page":"131","volume-title":"Proceedings of the Congress on Evolutionary Computation","author":"A. Freitas","year":"2005","unstructured":"Secker.,Freitas, A., Timmis, J.: AISEC: An Artificial Immune System for Email Classification. In: Proceedings of the Congress on Evolutionary Computation, vol.\u00a02003, pp. 131\u2013139. IEEE, Canberra (2005)"},{"key":"33_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/3-540-36159-6_23","volume-title":"Information and Communications Security","author":"E. Lundin","year":"2002","unstructured":"Lundin, E., Kvarnstr\u00f6m, H., Jonsson, E.: A synthetic fraud data generation methodology. In: Deng, R.H., Qing, S., Bao, F., Zhou, J. (eds.) ICICS 2002. LNCS, vol.\u00a02513, pp. 265\u2013277. Springer, Heidelberg (2002)"}],"container-title":["Lecture Notes in Computer Science","Artificial Immune Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-22371-6_33","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,6]],"date-time":"2025-03-06T22:11:24Z","timestamp":1741299084000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-22371-6_33"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642223709","9783642223716"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-22371-6_33","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}