{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T07:25:42Z","timestamp":1761895542174,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642337567"},{"type":"electronic","value":"9783642337574"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-33757-4_14","type":"book-chapter","created":{"date-parts":[[2012,8,24]],"date-time":"2012-08-24T10:01:36Z","timestamp":1345802496000},"page":"178-190","source":"Crossref","is-referenced-by-count":11,"title":["A Negative Selection Approach to Intrusion Detection"],"prefix":"10.1007","author":[{"given":"Patricia","family":"Mostardinha","sequence":"first","affiliation":[]},{"given":"Bruno Filipe","family":"Faria","sequence":"additional","affiliation":[]},{"given":"Andr\u00e9","family":"Z\u00faquete","sequence":"additional","affiliation":[]},{"given":"Fern\u00e3o","family":"Vistulo de Abreu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"14_CR1","doi-asserted-by":"crossref","unstructured":"Herv\u00e9 Debar, M.D., Wespi, A.: Towards a taxonomy of intrusion-detection systems. Computational Networks\u00a0(31), 805\u2013822 (1999)","DOI":"10.1016\/S1389-1286(98)00017-6"},{"key":"14_CR2","doi-asserted-by":"crossref","first-page":"176","DOI":"10.1111\/j.1600-065X.2007.00499.x","volume":"216","author":"S. Forrest","year":"2007","unstructured":"Forrest, S., Beauchemin, C.: Computer immunology. Immunological Reviews\u00a0216, 176\u2013197 (2007)","journal-title":"Immunological Reviews"},{"key":"14_CR3","doi-asserted-by":"crossref","unstructured":"Forrest, S., et al.: Self-Nonself Discrimination in a Computer. In: Proceedings of IEEE Computer Society Symposium on Research in Security and Privacy, pp. 202\u2013212 (1994)","DOI":"10.1109\/RISP.1994.296580"},{"issue":"10","key":"14_CR4","doi-asserted-by":"publisher","first-page":"1407","DOI":"10.1016\/j.ins.2008.10.034","volume":"179","author":"M.\u00c7. Bereta","year":"2009","unstructured":"Bereta, M.\u00c7., Burczynski, T.: Immune K-means and negative selection algorithms for data analysis. Information Sciences\u00a0179(10), 1407\u20131425 (2009)","journal-title":"Information Sciences"},{"key":"14_CR5","first-page":"277","volume-title":"Immunological computation : theory and applications","author":"D. Dasgupta","year":"2009","unstructured":"Dasgupta, D., Ni\u00f1o, L.F.: Immunological computation: theory and applications, vol.\u00a0xviii, p. 277. CRC, Boca Raton (2009)"},{"issue":"1","key":"14_CR6","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1016\/j.inffus.2009.04.006","volume":"11","author":"J. Greensmith","year":"2010","unstructured":"Greensmith, J., Aickelin, U., Tedesco, G.: Information fusion for anomaly detection with the dendritic cell algorithm. Inf. Fusion\u00a011(1), 21\u201334 (2010)","journal-title":"Inf. Fusion"},{"issue":"1","key":"14_CR7","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1016\/j.tcs.2008.02.011","volume":"403","author":"A. Hone","year":"2008","unstructured":"Hone, A., et al.: Theoretical advances in artificial immune systems. Theoretical Computer Science\u00a0403(1), 11\u201332 (2008)","journal-title":"Theoretical Computer Science"},{"issue":"4","key":"14_CR8","doi-asserted-by":"publisher","first-page":"413","DOI":"10.1007\/s11047-006-9026-4","volume":"6","author":"J. Kim","year":"2007","unstructured":"Kim, J., et al.: Immune system approaches to intrusion detection \u2013 a review. Natural Computing\u00a06(4), 413\u2013466 (2007)","journal-title":"Natural Computing"},{"key":"14_CR9","doi-asserted-by":"crossref","unstructured":"Xie, Z.X., et al.: A distributed agent-based approach to intrusion detection using the lightweight PCC anomaly detection classifier. In: Proceedings of IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, vol.\u00a01, pp. 446\u2013453 (2006)","DOI":"10.1109\/SUTC.2006.1636211"},{"issue":"5","key":"14_CR10","doi-asserted-by":"publisher","first-page":"595","DOI":"10.1007\/978-3-642-23777-5_96","volume":"17","author":"D.W. Wang","year":"2011","unstructured":"Wang, D.W., Xue, Y.B., Dong, Y.F.: Anomaly Detection Using Neighborhood Negative Selection. Intelligent Automation and Soft Computing\u00a017(5), 595\u2013605 (2011)","journal-title":"Intelligent Automation and Soft Computing"},{"issue":"2","key":"14_CR11","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1016\/j.mineng.2006.05.012","volume":"20","author":"X. Yang","year":"2007","unstructured":"Yang, X., Aldrich, C., Maree, C.: Detecting change in dynamic process systems with immunocomputing. Minerals Engineering\u00a020(2), 103\u2013112 (2007)","journal-title":"Minerals Engineering"},{"issue":"2","key":"14_CR12","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1162\/evco.2007.15.2.223","volume":"15","author":"Z. Ji","year":"2007","unstructured":"Ji, Z., Dasgupta, D.: Revisiting negative selection algorithms. Evolutionary Computation\u00a015(2), 223\u2013251 (2007)","journal-title":"Evolutionary Computation"},{"key":"14_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1007\/11823940_17","volume-title":"Artificial Immune Systems","author":"T. Stibor","year":"2006","unstructured":"Stibor, T., Timmis, J.I., Eckert, C.: On the Use of Hyperspheres in Artificial Immune Systems as Antibody Recognition Regions. In: Bersini, H., Carneiro, J. (eds.) ICARIS 2006. LNCS, vol.\u00a04163, pp. 215\u2013228. Springer, Heidelberg (2006)"},{"key":"14_CR14","unstructured":"Kim, J., Bentley, P.J.: Negative Selection within an Artificial Immune for Network Intrusion Detection. In: 14th Annual Fall Symposium of the Korean Information Processing Society, Seoul, Korea (2000)"},{"issue":"11","key":"14_CR15","doi-asserted-by":"publisher","first-page":"5042","DOI":"10.1073\/pnas.92.11.5042","volume":"92","author":"T.W. Mckeithan","year":"1995","unstructured":"Mckeithan, T.W.: Kinetic Proofreading in T-Cell Receptor Signal-Transduction. Proceedings of the National Academy of Sciences of the United States of America\u00a092(11), 5042\u20135046 (1995)","journal-title":"Proceedings of the National Academy of Sciences of the United States of America"},{"key":"14_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1007\/11823940_4","volume-title":"Artificial Immune Systems","author":"F.V. de Abreu","year":"2006","unstructured":"de Abreu, F.V., et al.: Cellular Frustration: A New Conceptual Framework for Understanding Cell-Mediated Immune Responses. In: Bersini, H., Carneiro, J., et al. (eds.) ICARIS 2006. LNCS, vol.\u00a04163, pp. 37\u201351. Springer, Heidelberg (2006)"},{"key":"14_CR17","unstructured":"Lindo, A., Faria, B., de Abreu, F.: Tunable kinetic proofreading in a model with molecular frustration. Theory in Biosciences, 1\u20138"},{"issue":"32","key":"14_CR18","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1098\/rsif.2008.0280","volume":"6","author":"F.V. de Abreu","year":"2009","unstructured":"de Abreu, F.V., Mostardinha, P.: Maximal frustration as an immunological principle. Journal of the Royal Society Interface\u00a06(32), 321\u2013334 (2009)","journal-title":"Journal of the Royal Society Interface"},{"key":"14_CR19","doi-asserted-by":"crossref","unstructured":"Abbas, A.K., Lichtman, A.H.: Basic Immunology: Functions and Disorders of the Immune System. W B SAUNDERS (2010)","DOI":"10.1016\/B978-1-4160-5569-3.50004-4"},{"key":"14_CR20","unstructured":"Janeway, C.: Immunobiology five. Garland Pub. (2001)"}],"container-title":["Lecture Notes in Computer Science","Artificial Immune Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-33757-4_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,7]],"date-time":"2025-04-07T05:51:40Z","timestamp":1744005100000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-642-33757-4_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642337567","9783642337574"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-33757-4_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}