{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T12:44:37Z","timestamp":1742993077761,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642337567"},{"type":"electronic","value":"9783642337574"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-33757-4_16","type":"book-chapter","created":{"date-parts":[[2012,8,24]],"date-time":"2012-08-24T10:01:36Z","timestamp":1345802496000},"page":"205-217","source":"Crossref","is-referenced-by-count":0,"title":["A Real Time Anomaly Detection System Based on Probabilistic Artificial Immune Based Algorithm"],"prefix":"10.1007","author":[{"given":"Mahdi","family":"Mohammadi","sequence":"first","affiliation":[]},{"given":"Ahmad","family":"Akbari","sequence":"additional","affiliation":[]},{"given":"Bijan","family":"Raahemi","sequence":"additional","affiliation":[]},{"given":"Babak","family":"Nassersharif","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"16_CR1","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1016\/j.cose.2008.06.002","volume":"27","author":"W. Masri","year":"2008","unstructured":"Masri, W., Podgurski, A.: Application-based anomaly intrusion detection with dynamic information flow analysis. Computers & Security\u00a027, 176\u2013187 (2008)","journal-title":"Computers & Security"},{"key":"16_CR2","doi-asserted-by":"publisher","first-page":"3902","DOI":"10.1016\/j.cma.2004.09.007","volume":"194","author":"K. Seok Lee","year":"2005","unstructured":"Seok Lee, K., Woo, Z.: A new meta-heuristic algorithm for continuous engineering optimization: harmony search theory and practice. Computer Methods in Applied Mechanic and Engineering\u00a0194, 3902\u20133933 (2005)","journal-title":"Computer Methods in Applied Mechanic and Engineering"},{"issue":"3","key":"16_CR3","doi-asserted-by":"publisher","first-page":"894","DOI":"10.1109\/TGRS.2011.2162589","volume":"50","author":"Y. Zhong","year":"2012","unstructured":"Zhong, Y., Zhang, L.: An Adaptive Artificial Immune Network for Supervised Classification of Multi-Hyperspectral Remote Sensing Imagery. IEEE transaction on Geoscience and Remote Sensing\u00a050(3), 894\u2013909 (2012)","journal-title":"IEEE transaction on Geoscience and Remote Sensing"},{"issue":"5","key":"16_CR4","doi-asserted-by":"publisher","first-page":"680","DOI":"10.1109\/TITB.2008.926990","volume":"13","author":"K.K.. Delibasis","year":"2009","unstructured":"Delibasis, K.K., Asvestas, P.A., Matsopoulos, G.K., Zoulias, E., Tseleni-Balafouta, S.: Computer-Aided Diagnosis of Thyroid Malignancy Using an Artificial ImmuneSystem Classification Algorithm. IEEE Transactions onInformation Technology in Biomedicine\u00a013(5), 680\u2013686 (2009)","journal-title":"IEEE Transactions onInformation Technology in Biomedicine"},{"key":"16_CR5","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1016\/j.ins.2011.11.032","volume":"189","author":"M. Mohammadi","year":"2012","unstructured":"Mohammadi, M., Raahemi, B., Akbari, A., Nassersharif, B., Moeinzadeh, H.: Improving linear discriminant analysis with artificial immune system-based evolutionary algorithms. Information Sciences\u00a0189, 219\u2013232 (2012)","journal-title":"Information Sciences"},{"key":"16_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"287","DOI":"10.1007\/978-3-540-24854-5_30","volume-title":"Genetic and Evolutionary Computation \u2013 GECCO 2004","author":"Z. Ji","year":"2004","unstructured":"Ji, Z., Dasgupta, D.: Real-Valued Negative Selection Algorithm with Variable-Sized Detectors. In: Deb, K., Tari, Z. (eds.) GECCO 2004. LNCS, vol.\u00a03102, pp. 287\u2013298. Springer, Heidelberg (2004)"},{"issue":"5","key":"16_CR7","doi-asserted-by":"publisher","first-page":"5947","DOI":"10.1016\/j.eswa.2010.11.028","volume":"38","author":"V. Bol\u00f3n-Canedo","year":"2011","unstructured":"Bol\u00f3n-Canedo, V., S\u00e1nchez-Maro\u00f1o, N., Alonso-Betanzos, A.: Feature selection and classification in multiple class datasets: An application to KDDCup 1999 dataset. Systems with Applications\u00a038(5), 5947\u20135957 (2011)","journal-title":"Systems with Applications"},{"issue":"1","key":"16_CR8","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1016\/j.patcog.2009.05.017","volume":"43","author":"C. Tsai","year":"2010","unstructured":"Tsai, C., Lin, C.: A triangle area based nearest neighbors approach to intrusion detection. Pattern Recognition\u00a043(1), 222\u2013229 (2010)","journal-title":"Pattern Recognition"},{"key":"16_CR9","doi-asserted-by":"crossref","unstructured":"Gogoi, P., Bhattacharyya, D.: Anomaly Detection Analysis of Intrusion Data using Supervised & Unsupervised Approach. Journal of Convergence Information Technology\u00a05(1) (February 2010)","DOI":"10.4156\/jcit.vol5.issue1.11"},{"key":"16_CR10","unstructured":"Mohammadi, M., Raahemi, B., Akbari, A., Nassersharif, B.: Unsupervised Sample Reduction Using Clustering for Intrusion Detection System, Submitted to Security and Communication Network Journal (under review)"}],"container-title":["Lecture Notes in Computer Science","Artificial Immune Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-33757-4_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,12]],"date-time":"2023-02-12T00:08:05Z","timestamp":1676160485000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-642-33757-4_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642337567","9783642337574"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-33757-4_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}