{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,8]],"date-time":"2025-04-08T04:06:56Z","timestamp":1744085216227,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":28,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642337567"},{"type":"electronic","value":"9783642337574"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-33757-4_18","type":"book-chapter","created":{"date-parts":[[2012,8,24]],"date-time":"2012-08-24T10:01:36Z","timestamp":1345802496000},"page":"232-245","source":"Crossref","is-referenced-by-count":0,"title":["An Ecological Approach to Anomaly Detection: The EIA Model"],"prefix":"10.1007","author":[{"given":"Pedro","family":"Pinacho","sequence":"first","affiliation":[]},{"given":"Iv\u00e1n","family":"Pau","sequence":"additional","affiliation":[]},{"given":"Max","family":"Chac\u00f3n","sequence":"additional","affiliation":[]},{"given":"Sergio","family":"S\u00e1nchez","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"18_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1007\/978-3-540-45192-1_11","volume-title":"Artificial Immune Systems","author":"N. Atreas","year":"2003","unstructured":"Atreas, N., Karanikas, C., Tarakanov, A.: Signal Processing by an Immune Type Tree Transform. In: Timmis, J., Bentley, P.J., Hart, E. (eds.) ICARIS 2003. LNCS, vol.\u00a02787, pp. 111\u2013119. Springer, Heidelberg (2003)"},{"key":"18_CR2","first-page":"107","volume-title":"Proceedings of the 1st International Conference on Artificial Immune Systems (ICARIS)","author":"H. Bersini","year":"2002","unstructured":"Bersini, H.: Self-assertion versus self-recognition: A tribute to Francisco Varela. In: Timmis, J., Bentley, P.J. (eds.) Proceedings of the 1st International Conference on Artificial Immune Systems (ICARIS), pp. 107\u2013112. University of Kent at Canterbury Printing Unit, University of Kent at Canterbury (2002), http:\/\/www.aber.ac.uk\/icaris-2002"},{"key":"18_CR3","doi-asserted-by":"crossref","unstructured":"de Castro, L., Von Zuben, F.: ainet an artificial immune network for data analysis. In: Publishing, I.G. (ed.) Data Mining: A Heuristic Approach, pp. 231\u2013259. Idea Group Publishing (2001)","DOI":"10.4018\/978-1-930708-25-9.ch012"},{"issue":"1","key":"18_CR4","doi-asserted-by":"publisher","first-page":"17","DOI":"10.4067\/S0716-97602003000100004","volume":"36","author":"A. Coutinho","year":"2003","unstructured":"Coutinho, A.: A walk with francisco varela from first- to second- generation networks: In search of the structure, dynamics and metadynamics of an organism-centered immune system. Biological Research\u00a036(1), 17\u201326 (2003)","journal-title":"Biological Research"},{"key":"18_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/11536444_2","volume-title":"Artificial Immune Systems","author":"V. Cutello","year":"2005","unstructured":"Cutello, V., Narzisi, G., Nicosia, G., Pavone, M.: Clonal Selection Algorithms: A Comparative Case Study Using Effective Mutation Potentials. In: Jacob, C., Pilat, M.L., Bentley, P.J., Timmis, J.I. (eds.) ICARIS 2005. LNCS, vol.\u00a03627, pp. 13\u201328. Springer, Heidelberg (2005)"},{"key":"18_CR6","doi-asserted-by":"crossref","unstructured":"Dasgupta, D.: Artificial immune systems and their applications. Springer (1998)","DOI":"10.1007\/978-3-642-59901-9"},{"issue":"16","key":"18_CR7","doi-asserted-by":"publisher","first-page":"1569","DOI":"10.1016\/j.comcom.2004.07.002","volume":"27","author":"J.M. Estevez-Tapiador","year":"2004","unstructured":"Estevez-Tapiador, J.M., Garcia-Teodoro, P., Diaz-Verdejo, J.E.: Anomaly detection methods in wired networks: a survey and taxonomy. Computer Communications\u00a027(16), 1569\u20131584 (2004)","journal-title":"Computer Communications"},{"issue":"8","key":"18_CR8","doi-asserted-by":"publisher","first-page":"861","DOI":"10.1016\/j.patrec.2005.10.010","volume":"27","author":"T. Fawcett","year":"2006","unstructured":"Fawcett, T.: An introduction to ROC analysis. Pattern Recognition Letters\u00a027(8), 861\u2013874 (2006), rOC Analysis in Pattern Recognition","journal-title":"Pattern Recognition Letters"},{"key":"18_CR9","doi-asserted-by":"crossref","unstructured":"Forrest, S., Perelson, A., Allen, L., Cherukuri, R.: Self-Nonself Discrimination in a Computer. In: Proceedings of IEEE Computer Society Symposium on Research in Security and Privacy, pp. 202\u2013212 (1994); IEEE, Comp. Soc.; IEEE, Comp. Soc., Tech. Comm. Secur. & Privacy; Int. Assoc. Cryptol. Res. (1994); 1994 IEEE-Computer-Society Symposium on Research in Security and Privacy, Oakland, CA, May 16-18 (1994)","DOI":"10.1109\/RISP.1994.296580"},{"issue":"2","key":"18_CR10","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1162\/1063656054088503","volume":"13","author":"M. Glickman","year":"2005","unstructured":"Glickman, M., Balthrop, J., Forrest, S.: A machine learning evaluation of an artificial immune system. Evolutionary Computation\u00a013(2), 179\u2013212 (2005)","journal-title":"Evolutionary Computation"},{"issue":"1","key":"18_CR11","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1109\/MSP.2008.8","volume":"6","author":"F.L. Greitzer","year":"2008","unstructured":"Greitzer, F.L., Moore, A.P., Cappelli, D.M., Andrews, D.H., Carroll, L.A., Hull, T.D.: Combating the insider cyber threat. IEEE Security & Privacy\u00a06(1), 61\u201364 (2008)","journal-title":"IEEE Security & Privacy"},{"issue":"3","key":"18_CR12","doi-asserted-by":"publisher","first-page":"252","DOI":"10.1109\/TEVC.2002.1011540","volume":"6","author":"P. Harmer","year":"2002","unstructured":"Harmer, P., Williams, P., Gunsch, G., Lamont, G.: An artificial immune system architecture for computer security applications. IEEE Transactions on Evolutionary Computation\u00a06(3), 252\u2013280 (2002)","journal-title":"IEEE Transactions on Evolutionary Computation"},{"key":"18_CR13","doi-asserted-by":"crossref","unstructured":"Horn, R., Johnson, C.: Matrix Analysis. Cambridge University Press (1986)","DOI":"10.1017\/CBO9780511810817"},{"key":"18_CR14","volume-title":"El Arbol del Conocimiento","author":"F.V. Humberto Maturana","year":"1976","unstructured":"Humberto Maturana, F.V.: El Arbol del Conocimiento. Editorial Universitaria, Santiago (1976)"},{"key":"18_CR15","volume-title":"Bioindicators and environmental management","author":"D.W. Jeffrey","year":"1991","unstructured":"Jeffrey, D.W., Madden, B.: Bioindicators and environmental management. Academic Press, London (1991)"},{"key":"18_CR16","unstructured":"Kukielka, P., Kotulski, Z.: Analysis of Different Architectures of Neural Networks for Application in Intrusion Detection Systems. In: Ganzha, M., Paprzycki, M., PelechPilichowski, T. (eds.) International Multiconference on Computer Science and Information Technology (IMCSIT), Wisla, Poland, October 20-22, vol.\u00a01 and 2, pp. 752\u2013756. IEEE (2008)"},{"key":"18_CR17","unstructured":"Linda, O., Vollmer, T., Manic, M.: Neural Network Based Intrusion Detection System for Critical Infrastructures. In: IEEE International Joint Conference on Neural Networks (IJCNN), Int. Neural Network Soc., Atlanta, GA, June 14-19, vol.\u00a01- 6, pp. 102\u2013109 (2009)"},{"issue":"4","key":"18_CR18","first-page":"579","volume":"34","author":"R. Lippmann","year":"2000","unstructured":"Lippmann, R., Haines, J.W., Fried, D.J., Korba, J., Das, K.: The 1999 DARPA off-line intrusion detection evaluation. Computer Networks-the International Journal of Computer and Telecommunications Networking\u00a034(4), 579\u2013595 (2000)","journal-title":"Computer Networks-the International Journal of Computer and Telecommunications Networking"},{"issue":"1","key":"18_CR19","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1016\/0169-5347(96)81067-6","volume":"11","author":"J.M. Halley","year":"1996","unstructured":"Halley, J.M.: Ecology, evolution and 1f-noise. Trends in Ecology &amp; Evolution\u00a011(1), 33\u201337 (1996)","journal-title":"Trends in Ecology &amp; Evolution"},{"key":"18_CR20","doi-asserted-by":"publisher","first-page":"387","DOI":"10.1007\/s11047-008-9068-x","volume":"8","author":"N. Nanas","year":"2009","unstructured":"Nanas, N., de Roeck, A.: Autopoiesis, the immune system, and adaptive information filtering. Natural Computing\u00a08, 387\u2013427 (2009), doi:10.1007\/s11047-008-9068-x","journal-title":"Natural Computing"},{"key":"18_CR21","unstructured":"Olusola, A.A., Oladele, A.S., Abosede, D.O.: Analysis of KDD \u201899 Intrusion Detection Dataset for Selection of Relevance Features. In: Ao, S.I., Douglas, C., Grundfest, W.S., Burgstone, J. (eds.) World Congress on Engineering and Computer Science, Int. Assoc. Engn., San Francisco, CA, October 20-22. Lecture Notes in Engineering and Computer Science, vol.\u00a01 and 2, pp. 162\u2013168 (2010)"},{"key":"18_CR22","unstructured":"Haykin, S.O.: Neural Networks and Learning Machines, 3rd edn., new york edn. Prentice Hall (2009)"},{"issue":"3","key":"18_CR23","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1162\/artl.2007.13.3.303","volume":"13","author":"E. Sklar","year":"2007","unstructured":"Sklar, E.: Software review: NetLogo, a multi-agent simulation environment. Artificial Life\u00a013(3), 303\u2013311 (2007)","journal-title":"Artificial Life"},{"issue":"2","key":"18_CR24","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1109\/MCI.2008.919069","volume":"3","author":"A.O. Tarakanov","year":"2008","unstructured":"Tarakanov, A.O.: Immunocomputing for intelligent intrusion detection. IEEE Computational Intelligence Magazine\u00a03(2), 22\u201330 (2008)","journal-title":"IEEE Computational Intelligence Magazine"},{"key":"18_CR25","doi-asserted-by":"crossref","unstructured":"Tavallaee, M., Bagheri, E., Lu, W., Ghorbani, A.: A detailed analysis of the KDD CUP 99 data set. In: IEEE Symposium on Computational Intelligence for Security and Defense Applications, CISDA 2009, pp. 1\u20136 (July 2009)","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"18_CR26","volume-title":"El Fen\u00f3meno de la Vida","author":"F. Varela","year":"2000","unstructured":"Varela, F.: El Fen\u00f3meno de la Vida, 2nd edn. OCEANO, Santiago de Chile (2000)","edition":"2"},{"issue":"6","key":"18_CR27","doi-asserted-by":"publisher","first-page":"80","DOI":"10.2307\/3001968","volume":"1","author":"F. Wilcoxon","year":"1945","unstructured":"Wilcoxon, F.: Indicidual Comparisons by Ranking Methods. Biometrics Bulletin\u00a01(6), 80\u201383 (1945)","journal-title":"Biometrics Bulletin"},{"issue":"1","key":"18_CR28","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.asoc.2009.06.019","volume":"10","author":"S.X. Wu","year":"2010","unstructured":"Wu, S.X., Banzhaf, W.: The use of computational intelligence in intrusion detection systems: A review. Applied Soft Computing\u00a010(1), 1\u201335 (2010)","journal-title":"Applied Soft Computing"}],"container-title":["Lecture Notes in Computer Science","Artificial Immune Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-33757-4_18.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,7]],"date-time":"2025-04-07T05:51:42Z","timestamp":1744005102000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-33757-4_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642337567","9783642337574"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-33757-4_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}