{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T08:07:57Z","timestamp":1742976477100,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642337567"},{"type":"electronic","value":"9783642337574"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-33757-4_19","type":"book-chapter","created":{"date-parts":[[2012,8,24]],"date-time":"2012-08-24T10:01:36Z","timestamp":1345802496000},"page":"246-259","source":"Crossref","is-referenced-by-count":1,"title":["Rethinking Concepts of the Dendritic Cell Algorithm for Multiple Data Stream Analysis"],"prefix":"10.1007","author":[{"given":"Chris","family":"Musselle","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"19_CR1","doi-asserted-by":"crossref","unstructured":"Al-Hammadi, Y., Aickelin, U., Greensmith, J.: DCA for bot detection. In: 2008 IEEE Congress on Evolutionary Computation (IEEE World Congress on Computational Intelligence), pp. 1807\u20131816. IEEE (June 2008)","DOI":"10.1109\/CEC.2008.4631034"},{"key":"19_CR2","unstructured":"Author. Data Fusion Techniques for Temporal Correlation and Anomaly Detection. PhD thesis, Author\u2019s Institution (submitted, April 2012)"},{"key":"19_CR3","doi-asserted-by":"crossref","unstructured":"Babcock, B., Babu, S., Datar, M., Motwani, R., Widom, J.: Models and issues in data stream systems. Technical Report 2002-19, Stanford InfoLab (2002)","DOI":"10.1145\/543613.543615"},{"key":"19_CR4","doi-asserted-by":"crossref","unstructured":"Bojanczyk, A.W., Nagy, J.G., Plemmons, R.J.: Block RLS using row householder reflections. Linear Algebra and its Applications, 188\u2013189, 31\u201361 (1993)","DOI":"10.1016\/0024-3795(93)90464-Y"},{"issue":"8","key":"19_CR5","doi-asserted-by":"publisher","first-page":"1327","DOI":"10.1109\/5.58320","volume":"78","author":"P. Comon","year":"1990","unstructured":"Comon, P., Golub, G.H.: Tracking a few extreme singular values and vectors in signal processing. Proceedings of the IEEE\u00a078(8), 1327\u20131343 (1990)","journal-title":"Proceedings of the IEEE"},{"key":"19_CR6","doi-asserted-by":"crossref","unstructured":"dos Santos Teixeira, P.P.H., Milidi\u00fa, R.L.R.: Data stream anomaly detection through principal subspace tracking. In: Proceedings of the 2010 ACM Symposium on Applied Computing, pp. 1609\u20131616 (2010)","DOI":"10.1145\/1774088.1774434"},{"issue":"4","key":"19_CR7","doi-asserted-by":"publisher","first-page":"1452","DOI":"10.1109\/TSP.2007.909335","volume":"56","author":"X.G. Doukopoulos","year":"2008","unstructured":"Doukopoulos, X.G., Moustakides, G.V.: Fast and stable subspace tracking. IEEE Transactions on Signal Processing\u00a056(4), 1452\u20131465 (2008)","journal-title":"IEEE Transactions on Signal Processing"},{"key":"19_CR8","doi-asserted-by":"crossref","unstructured":"Gama, J.: Knowledge Discovery from Data Streams, 1st edn. Chapman and Hall\/CRC (2010)","DOI":"10.1201\/EBK1439826119-c1"},{"key":"19_CR9","unstructured":"Golub, G., Van Loan, C.: Matrix Computations, 2nd edn. John Hopkins University Press (1989)"},{"key":"19_CR10","doi-asserted-by":"crossref","unstructured":"Greensmith, J.: The Dendritic Cell Algorithm. Phd thesis, University of Nottingham (2007)","DOI":"10.2139\/ssrn.2831280"},{"key":"19_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1007\/978-3-642-22371-6_17","volume-title":"Artificial Immune Systems","author":"F. Gu","year":"2011","unstructured":"Gu, F., Feyereisl, J., Oates, R., Reps, J., Greensmith, J., Aickelin, U.: Quiet in Class: Classification, Noise and the Dendritic Cell Algorithm. In: Li\u00f2, P., Nicosia, G., Stibor, T. (eds.) ICARIS 2011. LNCS, vol.\u00a06825, pp. 173\u2013186. Springer, Heidelberg (2011)"},{"key":"19_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"142","DOI":"10.1007\/978-3-540-85072-4_13","volume-title":"Artificial Immune Systems","author":"F. Gu","year":"2008","unstructured":"Gu, F., Greensmith, J., Aickelin, U.: Further Exploration of the Dendritic Cell Algorithm: Antigen Multiplier and Time Windows. In: Bentley, P.J., Lee, D., Jung, S. (eds.) ICARIS 2008. LNCS, vol.\u00a05132, pp. 142\u2013153. Springer, Heidelberg (2008)"},{"key":"19_CR13","unstructured":"Johnson, N., Kotz, S., Balakrishnan, N.: Continuous Univariate Distributions, 2nd edn., vol.\u00a02. Wiley-Blackwell (1995)"},{"key":"19_CR14","series-title":"Springer Series in Statistics","volume-title":"Principal Component Analysis","author":"I. Jolliffe","year":"2002","unstructured":"Jolliffe, I.: Principal Component Analysis. Springer Series in Statistics. Springer, New York (2002)"},{"issue":"3","key":"19_CR15","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1007\/PL00011669","volume":"3","author":"E. Keogh","year":"2001","unstructured":"Keogh, E., Chakrabarti, K., Pazzani, M., Mehrotra, S.: Dimensionality Reduction for Fast Similarity Search in Large Time Series Databases. Knowledge and Information Systems\u00a03(3), 263\u2013286 (2001)","journal-title":"Knowledge and Information Systems"},{"key":"19_CR16","unstructured":"Keogh, E., Lin, J.: SAX Homepage, \n                      http:\/\/www.cs.ucr.edu\/~eamonn\/SAX.html"},{"key":"19_CR17","doi-asserted-by":"crossref","unstructured":"Kim, J., Bentley, P., Wallenta, C., Ahmed, M., Hailes, S.: Danger is ubiquitous: Detecting malicious activities in sensor networks using the dendritic cell algorithm. In: Networks, pp. 390\u2013403 (2006)","DOI":"10.1007\/11823940_30"},{"key":"19_CR18","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1145\/882082.882086","volume-title":"Proceedings of the 8th ACM SIGMOD Workshop on Research issues in Data Mining and Knowledge Discovery - DMKD 2003","author":"J. Lin","year":"2003","unstructured":"Lin, J., Keogh, E., Lonardi, S., Chiu, B.: A symbolic representation of time series, with implications for streaming algorithms. In: Proceedings of the 8th ACM SIGMOD Workshop on Research issues in Data Mining and Knowledge Discovery - DMKD 2003, p. 2. ACM Press, New York (2003)"},{"key":"19_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"220","DOI":"10.1007\/978-3-642-03246-2_22","volume-title":"Artificial Immune Systems","author":"S. Manzoor","year":"2009","unstructured":"Manzoor, S., Shafiq, M.Z., Tabish, S.M., Farooq, M.: A Sense of \u2018Danger\u2019 for Windows Processes. In: Andrews, P.S., Timmis, J., Owens, N.D.L., Aickelin, U., Hart, E., Hone, A., Tyrrell, A.M. (eds.) ICARIS 2009. LNCS, vol.\u00a05666, pp. 220\u2013233. Springer, Heidelberg (2009)"},{"issue":"2","key":"19_CR20","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1007\/s12065-008-0011-y","volume":"1","author":"R. Oates","year":"2008","unstructured":"Oates, R., Kendall, G., Garibaldi, J.: Frequency analysis for dendritic cell population tuning. Evolutionary Intelligence\u00a01(2), 145\u2013157 (2008)","journal-title":"Evolutionary Intelligence"},{"key":"19_CR21","doi-asserted-by":"publisher","first-page":"1275","DOI":"10.1145\/1569901.1570072","volume-title":"Proceedings of the 11th Annual Conference on Genetic and Evolutionary Computation - GECCO 2009","author":"T. Stibor","year":"2009","unstructured":"Stibor, T., Oates, R., Kendall, G., Garibaldi, J.M.: Geometrical insights into the dendritic cell algorithm. In: Proceedings of the 11th Annual Conference on Genetic and Evolutionary Computation - GECCO 2009, p. 1275. ACM Press, New York (2009)"},{"issue":"12","key":"19_CR22","doi-asserted-by":"publisher","first-page":"2514","DOI":"10.1016\/j.sigpro.2009.04.012","volume":"89","author":"P. Strobach","year":"2009","unstructured":"Strobach, P.: The fast recursive row-Householder subspace tracking algorithm. Signal Process.\u00a089(12), 2514\u20132528 (2009)","journal-title":"Signal Process."}],"container-title":["Lecture Notes in Computer Science","Artificial Immune Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-33757-4_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,12]],"date-time":"2023-02-12T00:07:59Z","timestamp":1676160479000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-642-33757-4_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642337567","9783642337574"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-33757-4_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}