{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,6]],"date-time":"2025-05-06T04:03:50Z","timestamp":1746504230101,"version":"3.40.4"},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662452363"},{"type":"electronic","value":"9783662452370"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-662-45237-0_56","type":"book-chapter","created":{"date-parts":[[2014,10,25]],"date-time":"2014-10-25T14:37:20Z","timestamp":1414247840000},"page":"615-623","source":"Crossref","is-referenced-by-count":2,"title":["Hardware Approach for Generating b-detectors by Immune-Based Algorithms"],"prefix":"10.1007","author":[{"given":"Maciej","family":"Brzozowski","sequence":"first","affiliation":[]},{"given":"Andrzej","family":"Chmielewski","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"56_CR1","unstructured":"Balthrop, J., Esponda, F., Forrest, S., Glickman, M.: Coverage and generalization in an artificial immune system. In: Proc. of the Genetic and Evolutionary Computation Conference (GECCO 2002), New York, July 9-13, pp. 3\u201310 (2002)"},{"key":"56_CR2","doi-asserted-by":"crossref","unstructured":"Chu, P.P.: RTL Hardware Design Using Vhdl: Coding For Efficiency, Portability, and Scalability. Wiley-Interscience (2006)","DOI":"10.1002\/0471786411"},{"key":"56_CR3","unstructured":"de Castro, L., Timmis, J.: Artificial Immune Systems: A New Computational Intelligence Approach. Springer (2002)"},{"key":"56_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"242","DOI":"10.1007\/978-3-642-33260-9_21","volume-title":"Computer Information Systems and Industrial Management","author":"A. Chmielewski","year":"2012","unstructured":"Chmielewski, A., Wierzcho\u0144, S.T.: Hybrid negative selection approach for anomaly detection. In: Cortesi, A., Chaki, N., Saeed, K., Wierzcho\u0144, S. (eds.) CISIM 2012. LNCS, vol.\u00a07564, pp. 242\u2013253. Springer, Heidelberg (2012)"},{"key":"56_CR5","unstructured":"Forrest, S., Hofmeyr, S.A., Somayaji, A., Longstaff, T.A.: A sense of Self for Unix Processes. In: Proc. of the 1996 IEEE Symposium on Research in Security and Privacy, pp. 120\u2013128. IEEE Computer Society Press (1996)"},{"key":"56_CR6","doi-asserted-by":"crossref","unstructured":"Forrest, S., Perelson, A., Allen, L., Cherukuri, R.: Self-nonself discrimination in a computer. In: Proc. of the IEEE Symposium on Research in Security and Privacy, Los Alamitos, pp. 202\u2013212 (1994)","DOI":"10.1109\/RISP.1994.296580"},{"key":"56_CR7","doi-asserted-by":"publisher","first-page":"252","DOI":"10.1109\/TEVC.2002.1011540","volume":"6","author":"P.K. Harmer","year":"2002","unstructured":"Harmer, P.K., Wiliams, P.D., Gunsch, G.H., Lamont, G.B.: Artificial immune system architecture for computer security applications. IEEE Trans. on Evolutionary Computation\u00a06, 252\u2013280 (2002)","journal-title":"IEEE Trans. on Evolutionary Computation"},{"issue":"4","key":"56_CR8","doi-asserted-by":"publisher","first-page":"443","DOI":"10.1162\/106365600568257","volume":"8","author":"S. Hofmeyr","year":"2000","unstructured":"Hofmeyr, S., Forrest, S.: Architecture for an Artificial Immune System. Evolutionary Computation J.\u00a08(4), 443\u2013473 (2000)","journal-title":"Evolutionary Computation J."},{"key":"56_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"287","DOI":"10.1007\/978-3-540-24854-5_30","volume-title":"Genetic and Evolutionary Computation \u2013 GECCO 2004","author":"Z. Ji","year":"2004","unstructured":"Ji, Z., Dasgupta, D.: Real-valued negative selection algorithm with variable-sized detectors. In: Deb, K. (ed.) GECCO 2004. LNCS, vol.\u00a03102, pp. 287\u2013298. Springer, Heidelberg (2004)"},{"issue":"2","key":"56_CR10","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1162\/evco.2007.15.2.223","volume":"15","author":"Z. Ji","year":"2007","unstructured":"Ji, Z., Dasgupta, D.: Revisiting negative selection algorithms. Evolutionary Computation\u00a015(2), 223\u2013251 (2007)","journal-title":"Evolutionary Computation"},{"key":"56_CR11","doi-asserted-by":"crossref","unstructured":"Sayood, K.: Introduction to Data Compression. Elsevier (2005)","DOI":"10.1016\/B978-012620862-7\/50006-7"},{"key":"56_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"142","DOI":"10.1007\/978-3-540-73922-7_13","volume-title":"Artificial Immune Systems","author":"T. Stibor","year":"2007","unstructured":"Stibor, T.: Phase transition and the computational complexity of generating r-contiguous detectors. In: de Castro, L.N., Von Zuben, F.J., Knidel, H. (eds.) ICARIS 2007. LNCS, vol.\u00a04628, pp. 142\u2013155. Springer, Heidelberg (2007)"},{"key":"56_CR13","doi-asserted-by":"crossref","unstructured":"Vanderbauwhede, W., Benkrid, K.: High-Performance Computing Using FPGAs (2013)","DOI":"10.1007\/978-1-4614-1791-0"},{"key":"56_CR14","doi-asserted-by":"crossref","unstructured":"Wierzcho\u0144, S.T.: Generating optimal repertoire of antibody strings in an artificial immune system. In: K\u0142opotek, M.A., Michalewicz, M., Wierzcho\u0144, S.T. (eds.) Intelligent Information Systems. Proc. of the IIS 2000 Symposium, Bystra, Poland, June 12-16, pp. 119\u2013133. Springer (2000)","DOI":"10.1007\/978-3-7908-1846-8_12"}],"container-title":["Lecture Notes in Computer Science","Computer Information Systems and Industrial Management"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-45237-0_56","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,5]],"date-time":"2025-05-05T13:49:03Z","timestamp":1746452943000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-662-45237-0_56"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783662452363","9783662452370"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-45237-0_56","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}