{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T07:08:47Z","timestamp":1725692927931},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642326141"},{"type":"electronic","value":"9783642326158"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-32615-8_1","type":"book-chapter","created":{"date-parts":[[2012,7,24]],"date-time":"2012-07-24T04:50:30Z","timestamp":1343105430000},"page":"1-15","source":"Crossref","is-referenced-by-count":2,"title":["Self Tolerance by Tuning T-Cell Activation: An Artificial Immune System for Anomaly Detection"],"prefix":"10.1007","author":[{"given":"M\u00e1rio J.","family":"Antunes","sequence":"first","affiliation":[]},{"given":"Manuel E.","family":"Correia","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"1_CR1","doi-asserted-by":"crossref","unstructured":"Murphy, K., Murphy, K., Travers, P., Walport, M., Janeway, C.: Janeway\u2019s immunobiology. Garland Pub. (2008)","DOI":"10.1007\/978-3-662-44228-9"},{"key":"1_CR2","doi-asserted-by":"publisher","DOI":"10.5962\/bhl.title.8281","volume-title":"The Clonal Selection Theory of Acquired Immunity","author":"F. Burnet","year":"1959","unstructured":"Burnet, F.: The Clonal Selection Theory of Acquired Immunity. University Press Nashville, Tenn (1959)"},{"issue":"1","key":"1_CR3","doi-asserted-by":"publisher","first-page":"991","DOI":"10.1146\/annurev.iy.12.040194.005015","volume":"12","author":"P. Matzinger","year":"1994","unstructured":"Matzinger, P.: Tolerance, danger, and the extended family. Annual Review of Immunology\u00a012(1), 991\u20131045 (1994)","journal-title":"Annual Review of Immunology"},{"issue":"4","key":"1_CR4","doi-asserted-by":"publisher","first-page":"218","DOI":"10.1016\/j.istr.2007.10.003","volume":"12","author":"U. Aickelin","year":"2007","unstructured":"Aickelin, U., Greensmith, J.: Sensing danger: Innate immunology for intrusion detection. Information Security Technical Report\u00a012(4), 218\u2013227 (2007)","journal-title":"Information Security Technical Report"},{"key":"1_CR5","unstructured":"de Castro, L., Timmis, J.: Artificial Immune Systems: A New Computational Intelligence Approach. Springer (2002)"},{"issue":"4","key":"1_CR6","doi-asserted-by":"publisher","first-page":"443","DOI":"10.1162\/106365600568257","volume":"8","author":"S. Hofmeyr","year":"2000","unstructured":"Hofmeyr, S., Forrest, S.: Architecture for an artificial immune system. Evolutionary Computation\u00a08(4), 443\u2013473 (2000)","journal-title":"Evolutionary Computation"},{"issue":"4","key":"1_CR7","doi-asserted-by":"publisher","first-page":"413","DOI":"10.1007\/s11047-006-9026-4","volume":"6","author":"J. Kim","year":"2007","unstructured":"Kim, J., Bentley, P., Aickelin, U., Greensmith, J., Tedesco, G., Twycross, J.: Immune system approaches to intrusion detection - a review. Natural Computing\u00a06(4), 413\u2013466 (2007)","journal-title":"Natural Computing"},{"key":"1_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1007\/11536444_12","volume-title":"Artificial Immune Systems","author":"J. Greensmith","year":"2005","unstructured":"Greensmith, J., Aickelin, U., Cayzer, S.: Introducing Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomaly Detection. In: Jacob, C., Pilat, M.L., Bentley, P.J., Timmis, J.I. (eds.) ICARIS 2005. LNCS, vol.\u00a03627, pp. 153\u2013167. Springer, Heidelberg (2005)"},{"key":"1_CR9","doi-asserted-by":"crossref","unstructured":"Stibor, T., Mohr, P., Timmis, J., Eckert, C.: Is negative selection appropriate for anomaly detection? In: Proceedings of the 2005 Conference on Genetic and Evolutionary Computation, pp. 321\u2013328 (2005)","DOI":"10.1145\/1068009.1068061"},{"key":"1_CR10","unstructured":"Kim, J., Bentley, P.: An evaluation of negative selection in an artificial immune system for network intrusion detection. In: Genetic and Evolutionary Computation Conference, pp. 1330\u20131337 (2001)"},{"key":"1_CR11","doi-asserted-by":"crossref","unstructured":"Andrews, P., Timmis, J.: Tunable Detectors for Artificial Immune Systems: From Model to Algorithm. In: Bioinformatics for Immunomics, pp. 103\u2013127 (2010)","DOI":"10.1007\/978-1-4419-0540-6_9"},{"issue":"3","key":"1_CR12","first-page":"315","volume":"1","author":"S. Stepney","year":"2005","unstructured":"Stepney, S., Smith, R., Timmis, J., Tyrrell, A., Neal, M., Hone, A.: Conceptual frameworks for artificial immune systems. International Journal of Unconventional Computing\u00a01(3), 315\u2013338 (2005)","journal-title":"International Journal of Unconventional Computing"},{"key":"1_CR13","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1111\/j.1600-065X.1993.tb01509.x","volume":"133","author":"Z. Grossman","year":"1993","unstructured":"Grossman, Z.: Cellular tolerance as a dynamic state of the adaptable lymphocyte. Immunology Reviews\u00a0133, 45\u201373 (1993)","journal-title":"Immunology Reviews"},{"issue":"3","key":"1_CR14","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1006\/smim.2000.0232","volume":"12","author":"Z. Grossman","year":"2000","unstructured":"Grossman, Z., Paul, W.: Self-tolerance: context dependent tuning of T cell antigen recognition. Seminars in Immunology\u00a012(3), 197\u2013203 (2000)","journal-title":"Seminars in Immunology"},{"key":"1_CR15","doi-asserted-by":"crossref","unstructured":"Scherer, A., Noest, A., de Boer, R.: Activation-threshold tuning in an affinity model for the T-cell repertoire. In: Proceedings: Biological Sciences, vol.\u00a0271(1539), pp. 609\u2013616 (2004)","DOI":"10.1098\/rspb.2003.2653"},{"issue":"1","key":"1_CR16","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1016\/j.cam.2004.10.025","volume":"184","author":"J. Carneiro","year":"2005","unstructured":"Carneiro, J., Paix\u00e3o, T., Milutinovic, D., Sousa, J., Leon, K., Gardner, R., Faro, J.: Immunological self-tolerance: Lessons from mathematical modeling. Journal of Computational and Applied Mathematics\u00a0184(1), 77\u2013100 (2005)","journal-title":"Journal of Computational and Applied Mathematics"},{"issue":"1","key":"1_CR17","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1016\/S0951-8320(03)00058-9","volume":"81","author":"J. Helton","year":"2003","unstructured":"Helton, J., Davis, F.: Latin hypercube sampling and the propagation of uncertainty in analyses of complex systems. Reliability Engineering & System Safety\u00a081(1), 23\u201369 (2003)","journal-title":"Reliability Engineering & System Safety"},{"key":"1_CR18","unstructured":"Metsis, V., Androutsopoulos, I., Paliouras, G.: Spam filtering with naive bayes-which naive bayes. In: Third Conference on Email and Anti-Spam (CEAS), pp. 125\u2013134 (2006)"},{"key":"1_CR19","unstructured":"Abi-Haidar, A., Rocha, L.: Adaptive Spam Detection Inspired by the Immune System. In: Artificial Life XI - 11th Int. Conference on the Simulation Ans Synthesis Os Living Systems, vol.\u00a011, pp. 1\u20138 (2008)"},{"key":"1_CR20","doi-asserted-by":"crossref","unstructured":"Silva, C., Ribeiro, B.: Inductive Inference for Large Scale Text Classification: Kernel Approaches and Techniques. Springer (2009)","DOI":"10.1007\/978-3-642-04533-2"},{"key":"1_CR21","doi-asserted-by":"crossref","unstructured":"Antunes, M., Correia, M.: Temporal Anomaly Detection: an Artificial Immune Approach Based on T-cell Activation, Clonal Size Regulation and Homeostasis. Advances in Computational Biology - Book series\u00a0vol. 680, pp. 291\u2013298 (2010)","DOI":"10.1007\/978-1-4419-5913-3_33"},{"key":"1_CR22","series-title":"ASC","first-page":"60","volume-title":"IWPACBB 2008","author":"M. Antunes","year":"2008","unstructured":"Antunes, M., Correia, M.: TAT-NIDS: an immune-based anomaly detection architecture for network intrusion detection. In: Corchado, J.M., et al. (eds.) IWPACBB 2008. ASC, vol.\u00a049, pp. 60\u201367. Springer, Heidelberg (2008)"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Bio-Inspired Models of Network, Information, and Computing Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-32615-8_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,4]],"date-time":"2019-05-04T01:33:12Z","timestamp":1556933592000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-32615-8_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642326141","9783642326158"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-32615-8_1","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2012]]}}}