{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T13:52:07Z","timestamp":1725889927594},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642337567"},{"type":"electronic","value":"9783642337574"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-33757-4_4","type":"book-chapter","created":{"date-parts":[[2012,8,24]],"date-time":"2012-08-24T10:01:36Z","timestamp":1345802496000},"page":"42-56","source":"Crossref","is-referenced-by-count":7,"title":["Immune-Inspired Self Healing in Wireless Sensor Networks"],"prefix":"10.1007","author":[{"given":"TiongHoo","family":"Lim","sequence":"first","affiliation":[]},{"given":"HuiKeng","family":"Lau","sequence":"additional","affiliation":[]},{"given":"Jon","family":"Timmis","sequence":"additional","affiliation":[]},{"given":"Iain","family":"Bate","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"4","key":"4_CR1","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1016\/S1389-1286(01)00302-4","volume":"38","author":"I.F. Akyildiz","year":"2002","unstructured":"Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless sensor networks: A survey. Computer Networks\u00a038(4), 393\u2013422 (2002)","journal-title":"Computer Networks"},{"key":"4_CR2","doi-asserted-by":"crossref","unstructured":"Boers, N., Nikolaidis, I., Gburzynski, P.: Patterns in the RSSI traces from an indoor urban environment. In: The IEEE International Workshop on Computer Aided Modeling, Analysis and Design of Communication Links and Networks, pp. 61\u201365 (2010)","DOI":"10.1109\/CAMAD.2010.5686963"},{"key":"4_CR3","unstructured":"Cohen, I.R.: Tending Adam\u2019s Garden: Evolving the Cognitive Immune Self. Academic Press (2004)"},{"key":"4_CR4","doi-asserted-by":"crossref","unstructured":"Drozda, M., Bate, I., Timmis, J.: Bio-inspired error detection for complex systems. In: The 17th IEEE Pacific Rim International Symposium on Dependable Computing, pp. 154\u2013163 (2011)","DOI":"10.1109\/PRDC.2011.27"},{"key":"4_CR5","doi-asserted-by":"crossref","unstructured":"Drozda, M., Schaust, S., Szczerbicka, H.: AIS for misbehavior detection in wireless sensor networks: Performance and design principles. In: The IEEE Congress on Evolutionary Computation, pp. 3719\u20133726 (2007)","DOI":"10.1109\/CEC.2007.4424955"},{"key":"4_CR6","unstructured":"Gomez, C., Salvatella, P., Alonso, O., Paradells, J.: Adapting AODV for IEEE 802.15.4 mesh sensor networks: Theoretical discussion and performance evaluation in a real environment. In: The IEEE International Symposium on World of Wireless, Mobile and Multimedia Networks, pp. 159\u2013170 (2006)"},{"key":"4_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1007\/978-3-642-22371-6_21","volume-title":"Artificial Immune Systems","author":"J. Hilder","year":"2011","unstructured":"Hilder, J., Owens, N., Hickey, P., Cairns, S., Kilgour, D., Timmis, J., Tyrrell, A.: Parameter Optimisation in the Receptor Density Algorithm. In: Li\u00f2, P., Nicosia, G., Stibor, T. (eds.) ICARIS 2011. LNCS, vol.\u00a06825, pp. 226\u2013239. Springer, Heidelberg (2011)"},{"key":"4_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"390","DOI":"10.1007\/11823940_30","volume-title":"Artificial Immune Systems","author":"J. Kim","year":"2006","unstructured":"Kim, J., Bentley, P., Wallenta, C., Ahmed, M., Hailes, S.: Danger Is Ubiquitous: Detecting Malicious Activities in Sensor Networks Using the Dendritic Cell Algorithm. In: Bersini, H., Carneiro, J. (eds.) ICARIS 2006. LNCS, vol.\u00a04163, pp. 390\u2013403. Springer, Heidelberg (2006)"},{"key":"4_CR9","doi-asserted-by":"crossref","unstructured":"Ko, J., Terzis, A.: Power control for mobile sensor networks: An experimental approach. In: The 7th Annual IEEE Communications Society Conference on Sensor Mesh and Ad Hoc Communications and Networks (2010)","DOI":"10.1109\/SECON.2010.5508282"},{"key":"4_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"254","DOI":"10.1007\/978-3-642-22371-6_23","volume-title":"Artificial Immune Systems","author":"H.K. Lau","year":"2011","unstructured":"Lau, H.K., Timmis, J., Bate, I.: Collective Self-detection Scheme for Adaptive Error Detection in a Foraging Swarm of Robots. In: Li\u00f2, P., Nicosia, G., Stibor, T. (eds.) ICARIS 2011. LNCS, vol.\u00a06825, pp. 254\u2013267. Springer, Heidelberg (2011)"},{"key":"4_CR11","doi-asserted-by":"crossref","unstructured":"Lim, T.H., Bate, I., Timmis, J.: Multi-modal routing to tolerate failures. In: The 7th International Conference on Intelligent Sensors, Sensor Networks and Information Processing, pp. 211\u2013216 (2011)","DOI":"10.1109\/ISSNIP.2011.6146513"},{"key":"4_CR12","doi-asserted-by":"crossref","unstructured":"Lin, S., Zhang, J., Zhou, G., Gu, L., Stankovic, J., He, T.: ATPC: adaptive transmission power control for wireless sensor networks. In: The 4th International Conference on Embedded Networked Sensor Systems, pp. 223\u2013236 (2006)","DOI":"10.1145\/1182807.1182830"},{"key":"4_CR13","doi-asserted-by":"crossref","unstructured":"Lin, S., Zhou, G., Whitehouse, K., Wu, Y., Stankovic, J., He, T.: Towards stable network performance in wireless sensor networks. In: The 30th IEEE Real-Time Systems Symposium, pp. 227\u2013237 (2009)","DOI":"10.1109\/RTSS.2009.19"},{"key":"4_CR14","doi-asserted-by":"crossref","unstructured":"Liu, H., Li, J., Xie, Z., Lin, S., Whitehouse, K., Stankovic, J.A., Siu, D.: Automatic and robust breadcrumb system deployment for indoor firefighter applications. In: The 8th International Conference on Mobile Systems, Applications, and Services, pp. 21\u201334 (2010)","DOI":"10.1145\/1814433.1814438"},{"key":"4_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1007\/978-3-642-03246-2_15","volume-title":"Artificial Immune Systems","author":"N. Owens","year":"2009","unstructured":"Owens, N., Greensted, A., Timmis, J., Tyrell, A.: T Cell Receptor Signalling Inspired Kernel Density Estimation and Anomaly Detection. In: Andrews, P.S., Timmis, J., Owens, N.D.L., Aickelin, U., Hart, E., Hone, A., Tyrrell, A.M. (eds.) ICARIS 2009. LNCS, vol.\u00a05666, pp. 122\u2013135. Springer, Heidelberg (2009)"},{"key":"4_CR16","doi-asserted-by":"crossref","unstructured":"Perkins, C.E., Royer, E.M.: Ad-hoc on-demand distance vector routing. In: The IEEE Workshop on Mobile Computing Systems and Applications, pp. 90\u2013100 (1999)","DOI":"10.1109\/MCSA.1999.749281"},{"key":"4_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"212","DOI":"10.1007\/978-3-642-22371-6_20","volume-title":"Artificial Immune Systems","author":"S. Schaust","year":"2011","unstructured":"Schaust, S., Szczerbicka, H.: Applying Antigen-Receptor Degeneracy Behavior for Misbehavior Response Selection in Wireless Sensor Networks. In: Li\u00f2, P., Nicosia, G., Stibor, T. (eds.) ICARIS 2011. LNCS, vol.\u00a06825, pp. 212\u2013225. Springer, Heidelberg (2011)"},{"key":"4_CR18","doi-asserted-by":"crossref","unstructured":"Wang, Y., Wang, Q., Zeng, Z., Zheng, G., Zheng, R.: Wicop: Engineering wifi temporal white-spaces for safe operations of wireless body area networks in medical applications. In: The IEEE International Real-Time Systems Symposium, pp. 170\u2013179 (2011)","DOI":"10.1109\/RTSS.2011.23"},{"key":"4_CR19","doi-asserted-by":"crossref","unstructured":"Wu, Y., Kapitanova, K., Li, J., Stankovic, J., Son, S., Whitehouse, K.: Run time assurance of application-level requirements in wireless sensor networks. In: The 9th ACM\/IEEE International Conference on Information Processing in Sensor Networks, pp. 197\u2013208 (2010)","DOI":"10.1145\/1791212.1791236"}],"container-title":["Lecture Notes in Computer Science","Artificial Immune Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-33757-4_4.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T12:20:51Z","timestamp":1620130851000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-33757-4_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642337567","9783642337574"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-33757-4_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}