{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T21:52:38Z","timestamp":1742939558704,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642223709"},{"type":"electronic","value":"9783642223716"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-22371-6_35","type":"book-chapter","created":{"date-parts":[[2011,7,4]],"date-time":"2011-07-04T09:03:50Z","timestamp":1309770230000},"page":"406-418","source":"Crossref","is-referenced-by-count":2,"title":["The Danger Theory Applied To Vegetal Image Pattern Classification"],"prefix":"10.1007","author":[{"given":"Esma","family":"Bendiab","sequence":"first","affiliation":[]},{"given":"Mohamed Khirreddine","family":"Kholladi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"volume-title":"Artificial Immune Systems and their applications","year":"1999","key":"35_CR1","unstructured":"Dasgupta, D. (ed.): Artificial Immune Systems and their applications. Springer, Heidelberg (1999)"},{"volume-title":"Artificial Immune Systems: A New Computational Approach","year":"2002","key":"35_CR2","unstructured":"De Castro, L., Timmis, J. (eds.): Artificial Immune Systems: A New Computational Approach. Springer, London (September 2002)"},{"key":"35_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"483","DOI":"10.1007\/11536444_37","volume-title":"Artificial Immune Systems","author":"E. Hart","year":"2005","unstructured":"Hart, E., Timmis, J.: Application Areas of AIS: The Past, The Present and The Future. In: Jacob, C., Pilat, M.L., Bentley, P.J., Timmis, J.I. (eds.) ICARIS 2005. LNCS, vol.\u00a03627, pp. 483\u2013497. Springer, Heidelberg (2005)"},{"key":"35_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1007\/978-3-540-45192-1_15","volume-title":"Artificial Immune Systems","author":"U. Aickelin","year":"2003","unstructured":"Aickelin, U., Bentley, P., Cayzer, S., Kim, J., McLeod, J.: Danger theory: The link between AIS and IDS? In: Timmis, J., Bentley, P.J., Hart, E. (eds.) ICARIS 2003. LNCS, vol.\u00a02787, pp. 147\u2013155. Springer, Heidelberg (2003)"},{"key":"35_CR5","doi-asserted-by":"crossref","unstructured":"Aickelin, U., Cayzer, S.: The danger theory and its application to artificial immune systems. In: The 1st International Conference on Artificial Immune Systems (ICARIS 2002), Canterbury, UK, pp. 141\u2013148 (2002),","DOI":"10.2139\/ssrn.2832054"},{"key":"35_CR6","unstructured":"Greensmith, J.: The Dendritic Cell Algorith. PhD thesis, School of Computer Science. University of Nottingham (2007)"},{"volume-title":"Data Mining, Multimedia, Soft. Computing and Bioinformatics","year":"2003","key":"35_CR7","unstructured":"Mitra Tinkuacharya, S. (ed.): Data Mining, Multimedia, Soft. Computing and Bioinformatics. John Wiley & Sons, Hoboken (2003)"},{"key":"35_CR8","doi-asserted-by":"crossref","unstructured":"Lu, D., Weng, Q.: A survey of image classification methods and techniques for improving classification performance. International Journal of Remote Sensing\u00a028(5) (March 10,2007)","DOI":"10.1080\/01431160600746456"},{"key":"35_CR9","unstructured":"Berkhin, P.: Survey of clustering data mining techniques. Technical Report, Accrue Software, San Jose, California (2002)"},{"key":"35_CR10","unstructured":"Foucher, P., Revollon, P., Vigouroux, B.: Segmentation d\u2019images en couleurs par r\u00e9seau de neurones: Application au domaine v\u00e9g\u00e9tal, Actes du Congr\u00e9es francophone de Vision par Ordinateur (ORASIS), Cahors, France, pp. 309\u2013 317 (2001)"},{"key":"35_CR11","doi-asserted-by":"publisher","first-page":"1951","DOI":"10.1016\/S0167-8655(03)00034-5","volume":"24","author":"A. Clement","year":"2003","unstructured":"Clement, A., Vigouroux, B.: Unsupervised segmentation of scenes containing vegetation (Forsythia) and soil by hierarchical analysis of bi-dimensional histograms. Pattern Recognition Letters\u00a024, 1951\u20131957 (2003)","journal-title":"Pattern Recognition Letters"},{"key":"35_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1007\/11536444_12","volume-title":"Artificial Immune Systems","author":"J. Greensmith","year":"2005","unstructured":"Greensmith, J., Aickelin, U., Cayzer, S.: Introducing Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomaly Detection. In: Jacob, C., Pilat, M.L., Bentley, P.J., Timmis, J.I. (eds.) ICARIS 2005. LNCS, vol.\u00a03627, pp. 153\u2013167. Springer, Heidelberg (2005)"},{"key":"35_CR13","series-title":"Lecture Notes in Computer Science","first-page":"204","volume-title":"Artificial Immune Systems","author":"R. Oates","year":"2006","unstructured":"Oates, R., Greensmith, J., Aickelin, U., Garibaldi, J., Kendall, G.: The Application of a Dendritic Cell Algorithm to a Robotic Classifier. In: Bersini, H., Carneiro, J. (eds.) ICARIS 2006. LNCS, vol.\u00a04163, pp. 204\u2013215. Springer, Heidelberg (2006)"},{"key":"35_CR14","doi-asserted-by":"crossref","unstructured":"Greensmith, J., Twycross, J., Aickelin, U.: Dendritic Cells for Anomaly Detection. In: IEEE World Congress on Computational Intelligence, Vancouver, Canada, pp. 664\u2013671 (2006)","DOI":"10.1109\/CEC.2006.1688374"},{"key":"35_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"404","DOI":"10.1007\/11823940_31","volume-title":"Artificial Immune Systems","author":"J. Greensmith","year":"2006","unstructured":"Greensmith, J., Aickelin, U., Twycross, J.: Articulation and clarification of the dendritic cell algorithm. In: Bersini, H., Carneiro, J. (eds.) ICARIS 2006. LNCS, vol.\u00a04163, pp. 404\u2013417. Springer, Heidelberg (2006)"},{"key":"35_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"316","DOI":"10.1007\/978-3-540-30220-9_26","volume-title":"Artificial Immune Systems","author":"U. Aickelin","year":"2004","unstructured":"Aickelin, U., Greensmith, J., Twycross, J.: Immune System Approaches to Intrusion Detection \u2013 A Review. In: Nicosia, G., Cutello, V., Bentley, P.J., Timmis, J. (eds.) ICARIS 2004. LNCS, vol.\u00a03239, pp. 316\u2013329. Springer, Heidelberg (2004)"},{"key":"35_CR17","doi-asserted-by":"crossref","unstructured":"Greensmith, J., Twycross, J., Aickelin, U.: Dendritic cells for anomaly detection. In: IEEE Congress on Evolutionary Computation (2006)","DOI":"10.2139\/ssrn.2831377"},{"key":"35_CR18","doi-asserted-by":"crossref","unstructured":"Greensmith, J., Aickelin, U., Feyereisl, J.: The DCA-SOMe comparison: A comparative study between two biologically-inspired algorithms. Evolutionary Intelligence: Special Issue on Artificial Immune Systems (2008) (accepted for publication)","DOI":"10.1007\/s12065-008-0008-6"},{"key":"35_CR19","volume-title":"all: Danger theory and collaborative filtering in MANETs","author":"K. Hoffman","year":"2008","unstructured":"Hoffman, K. et al.: Danger theory and collaborative filtering in MANETs. Springer, Heidelberg (2008)"},{"key":"35_CR20","doi-asserted-by":"crossref","unstructured":"Greensmith, J., Aickelin, U., Tedesco, G.: Information Fusion for Anomaly Detection with the Dendritic Cell Algorithm. Journal Information Fusion\u00a011(1) (January 2010)","DOI":"10.1016\/j.inffus.2009.04.006"},{"key":"35_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1007\/978-3-540-85072-4_26","volume-title":"Artificial Immune Systems","author":"J. Greensmith","year":"2008","unstructured":"Greensmith, J., Aickelin, U.: The deterministic dendritic cell algorithm. In: Bentley, P.J., Lee, D., Jung, S. (eds.) ICARIS 2008. LNCS, vol.\u00a05132, pp. 291\u2013302. Springer, Heidelberg (2008)"},{"key":"35_CR22","doi-asserted-by":"publisher","first-page":"610","DOI":"10.1109\/TSMC.1973.4309314","volume":"3","author":"R.M. Haralick","year":"1973","unstructured":"Haralick, R.M., Shanmugam, K., Dinstein, I.: Textural Features for Image Classification. IEEE Transactions on Systems, Man, and Cybernetics\u00a03, 610\u2013621 (1973)","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics"}],"container-title":["Lecture Notes in Computer Science","Artificial Immune Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-22371-6_35","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,12]],"date-time":"2019-06-12T13:40:41Z","timestamp":1560346841000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-22371-6_35"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642223709","9783642223716"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-22371-6_35","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}