{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,8]],"date-time":"2025-04-08T04:07:55Z","timestamp":1744085275990,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642337567"},{"type":"electronic","value":"9783642337574"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-33757-4_3","type":"book-chapter","created":{"date-parts":[[2012,8,24]],"date-time":"2012-08-24T10:01:36Z","timestamp":1345802496000},"page":"28-41","source":"Crossref","is-referenced-by-count":4,"title":["A Comparative Study of Negative Selection Based Anomaly Detection in Sequence Data"],"prefix":"10.1007","author":[{"given":"Johannes","family":"Textor","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"3_CR1","doi-asserted-by":"crossref","unstructured":"Forrest, S., Perelson, A.S., Allen, L., Cherukuri, R.: Self-nonself discrimination in a computer. In: Proceedings of the IEEE Symposium on Research in Security and Privacy, pp. 202\u2013212. IEEE Computer Society Press (1994)","DOI":"10.1109\/RISP.1994.296580"},{"key":"3_CR2","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1145\/262793.262811","volume":"40","author":"S. Forrest","year":"1997","unstructured":"Forrest, S., Hofmeyr, S.A., Somayaji, A.: Computer immunology. Communications of the ACM\u00a040, 88\u201396 (1997)","journal-title":"Communications of the ACM"},{"key":"3_CR3","unstructured":"Kim, J., Bentley, P.J.: An evaluation of negative selection in an artificial immune system for network intrusion detection. In: Proceedings of the Genetic and Evolutionary Computation Conference (GECCO), pp. 1330\u20131337. Morgan Kaufmann (2001)"},{"key":"3_CR4","doi-asserted-by":"crossref","unstructured":"D\u2019haeseleer, P., Forrest, S., Helman, P.: An immunological approach to change detection: Algorithms, analysis, and implications. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 110\u2013119. IEEE Computer Society (1996)","DOI":"10.1109\/SECPRI.1996.502674"},{"key":"3_CR5","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1016\/j.tcs.2008.02.011","volume":"403","author":"J. Timmis","year":"2008","unstructured":"Timmis, J., Hone, A., Stibor, T., Clark, E.: Theoretical advances in artificial immune systems. Theoretical Computer Science\u00a0403, 11\u201332 (2008)","journal-title":"Theoretical Computer Science"},{"key":"3_CR6","doi-asserted-by":"crossref","first-page":"151","DOI":"10.3233\/JCS-980109","volume":"6","author":"S.A. Hofmeyr","year":"1998","unstructured":"Hofmeyr, S.A., Forrest, S., Somayaji, A.: Intrusion detection using sequences of system calls. Journal of Computer Security\u00a06, 151\u2013180 (1998)","journal-title":"Journal of Computer Security"},{"key":"3_CR7","unstructured":"Balthrop, J., Esponda, F., Forrest, S., Glickman, M.R.: Coverage and generalization in an artificial immune system. In: Proceedings of the 2002 Genetic and Evolutionary Computation Conference (GECCO 2002), pp. 1045\u20131050 (2002)"},{"key":"3_CR8","unstructured":"Stibor, T.: On the Appropriateness of Negative Selection for Anomaly Detection and Network Intrusion Detection. PhD thesis, Technische Universit\u00e4t Darmstadt (2006)"},{"key":"3_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"352","DOI":"10.1007\/978-3-540-85072-4_31","volume-title":"Artificial Immune Systems","author":"T. Stibor","year":"2008","unstructured":"Stibor, T.: An Empirical Study of Self\/Non-self Discrimination in Binary Data with a Kernel Estimator. In: Bentley, P.J., Lee, D., Jung, S. (eds.) ICARIS 2008. LNCS, vol.\u00a05132, pp. 352\u2013363. Springer, Heidelberg (2008)"},{"key":"3_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1007\/978-3-642-03246-2_14","volume-title":"Artificial Immune Systems","author":"M. Elberfeld","year":"2009","unstructured":"Elberfeld, M., Textor, J.: Efficient Algorithms for String-Based Negative Selection. In: Andrews, P.S., Timmis, J., Owens, N.D.L., Aickelin, U., Hart, E., Hone, A., Tyrrell, A.M. (eds.) ICARIS 2009. LNCS, vol.\u00a05666, pp. 109\u2013121. Springer, Heidelberg (2009)"},{"key":"3_CR11","doi-asserted-by":"publisher","first-page":"534","DOI":"10.1016\/j.tcs.2010.09.022","volume":"412","author":"M. Elberfeld","year":"2011","unstructured":"Elberfeld, M., Textor, J.: Negative selection algorithms on strings with efficient training and linear-time classification. Theoretical Computer Science\u00a0412, 534\u2013542 (2011)","journal-title":"Theoretical Computer Science"},{"key":"3_CR12","doi-asserted-by":"crossref","unstructured":"Stibor, T., Timmis, J., Eckert, C.: The link between r-contiguous detectors and k-CNF satisfiability. In: Proceedings of the Congress on Evolutionary Computation (CEC), pp. 491\u2013498. IEEE Press (2006)","DOI":"10.1109\/CEC.2006.1688350"},{"key":"3_CR13","doi-asserted-by":"crossref","unstructured":"Chandola, V., Mithal, V., Kumar, V.: A comparative evaluation of anomaly detection techniques for sequence data. In: Proceedings of the 2008 Eighth IEEE International Conference on Data Mining (ICDM 2008), pp. 743\u2013748 (2008)","DOI":"10.1109\/ICDM.2008.151"},{"issue":"3","key":"3_CR14","doi-asserted-by":"publisher","first-page":"463","DOI":"10.1016\/0893-6080(95)00120-4","volume":"9","author":"M.M. Moya","year":"1996","unstructured":"Moya, M.M., Hush, D.R.: Network constraints and multi-objective optimization for one-class classification. Neural Networks\u00a09(3), 463\u2013474 (1996)","journal-title":"Neural Networks"},{"issue":"3","key":"3_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1541880.1541882","volume":"41","author":"V. Chandola","year":"2009","unstructured":"Chandola, V., Banerjee, A., Kumar, V.: Anomaly detection: A survey. ACM Computing Surveys\u00a041(3), 1\u201358 (2009)","journal-title":"ACM Computing Surveys"},{"key":"3_CR16","doi-asserted-by":"crossref","unstructured":"Chapelle, O., Sch\u00f6lkopf, B., Zien, A. (eds.): Semi-Supervised Learning. Adaptive Computation and Machine Learning series. The MIT Press (2006)","DOI":"10.7551\/mitpress\/9780262033589.001.0001"},{"key":"3_CR17","doi-asserted-by":"crossref","unstructured":"Li\u015bkiewicz, M., Textor, J.: Negative selection algorithms without generating detectors. In: Proceedings of Genetic and Evolutionary Computation Conference (GECCO 2010), pp. 1047\u20131054. ACM (2010)","DOI":"10.1145\/1830483.1830673"},{"key":"3_CR18","doi-asserted-by":"crossref","unstructured":"Warrender, C., Forrest, S., Pearlmutter, B.: Detecting intrusions using system calls: Alternative data models. In: IEEE Symposium on Security and Privacy, pp. 133\u2013145. IEEE Computer Society (1999)","DOI":"10.1109\/SECPRI.1999.766910"},{"key":"3_CR19","doi-asserted-by":"crossref","unstructured":"Michael, C.C., Ghosh, A.: Two state-based approaches to program-based anomaly detection. In: Proceedings of the 16th Annual Computer Security Applications Conference, p.\u00a021 (2000)","DOI":"10.1109\/ACSAC.2000.898854"},{"key":"3_CR20","unstructured":"Jain, A.K., Dubes, R.C.: Algorithms for Clustering Data. Prentice Hall (1988)"},{"key":"3_CR21","volume-title":"Moby-Dick, or, The Whale","author":"H. Melville","year":"1952","unstructured":"Melville, H.: Moby-Dick, or, The Whale. Hendricks House, New York (1952)"},{"key":"3_CR22","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1093\/nar\/28.1.263","volume":"28","author":"A. Bateman","year":"2000","unstructured":"Bateman, A., Birney, E., Durbin, R., Eddy, S.R., Howe, K.L., Sonnhammer, E.L.: The PFAM protein families database. Nucleic Acids Research\u00a028, 263\u2013266 (2000)","journal-title":"Nucleic Acids Research"},{"key":"3_CR23","first-page":"120","volume-title":"Proceedings of the IEEE Symposium on Security and Privacy","author":"S. Forrest","year":"1996","unstructured":"Forrest, S., Hofmeyr, S.A., Somayaji, A., Longstaff, T.A.: A sense of self for unix processes. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 120\u2013128. IEEE Computer Society, Washington, DC (1996)"},{"key":"3_CR24","doi-asserted-by":"crossref","unstructured":"Lippmann, R.P., et al.: Evaluating intrusion detection systems \u2013 the 1998 DARPA offline intrusion detection evaluation. In: DARPA Information Survivability Conference and Exposition (DISCEX) 2000, vol.\u00a02, pp. 12\u201326. IEEE Computer Society Press (2000)","DOI":"10.1109\/DISCEX.2000.821506"}],"container-title":["Lecture Notes in Computer Science","Artificial Immune Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-33757-4_3.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,7]],"date-time":"2025-04-07T05:51:48Z","timestamp":1744005108000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-33757-4_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642337567","9783642337574"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-33757-4_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}