{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T06:10:10Z","timestamp":1746079810638,"version":"3.40.4"},"publisher-location":"Singapore","reference-count":38,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789814585170"},{"type":"electronic","value":"9789814585187"}],"license":[{"start":{"date-parts":[[2013,12,15]],"date-time":"2013-12-15T00:00:00Z","timestamp":1387065600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2013,12,15]],"date-time":"2013-12-15T00:00:00Z","timestamp":1387065600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-981-4585-18-7_20","type":"book-chapter","created":{"date-parts":[[2013,12,14]],"date-time":"2013-12-14T06:28:37Z","timestamp":1387002517000},"page":"167-176","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Negative Selection Algorithm: A Survey on the Epistemology of Generating Detectors"],"prefix":"10.1007","author":[{"given":"Ayodele","family":"Lasisi","sequence":"first","affiliation":[]},{"given":"Rozaida","family":"Ghazali","sequence":"additional","affiliation":[]},{"given":"Tutut","family":"Herawan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,12,15]]},"reference":[{"key":"20_CR1","unstructured":"Forrest, S., Perelson, A.S., Allen, L., Cherukuri, R.: Self-nonself discrimination in a computer. In: Research in Security and Privacy, 1994. Proceedings., 1994 IEEE Computer Society Symposium on, IEEE (1994) 202\u2013212"},{"issue":"7","key":"20_CR2","doi-asserted-by":"crossref","first-page":"639","DOI":"10.1038\/ni0705-639","volume":"6","author":"A.M. Silverstein","year":"2005","unstructured":"Silverstein, A.M.: Paul ehrlich, archives and the history of immunology. Nature immunology 6(7) (2005) 639\u2013639","journal-title":"Nature immunology"},{"key":"20_CR3","unstructured":"Immune, A.: Artificial immune systems. (2006) 107\u2013118"},{"key":"20_CR4","doi-asserted-by":"crossref","unstructured":"Greensmith, J., Whitbrook, A., Aickelin, U.: Artificial immune systems. In: Handbook of Metaheuristics. Springer (2010) 421\u2013448","DOI":"10.1007\/978-1-4419-1665-5_14"},{"key":"20_CR5","doi-asserted-by":"crossref","unstructured":"Aickelin, U., Dasgupta, D.: Artificial immune systems. In: Search Methodologies. Springer (2005) 375\u2013399 9","DOI":"10.1007\/0-387-28356-0_13"},{"issue":"5","key":"20_CR6","doi-asserted-by":"crossref","first-page":"629","DOI":"10.1016\/j.parco.2003.12.008","volume":"30","author":"A. Boukerche","year":"2004","unstructured":"Boukerche, A., Juc\u00e1, K.R.L., Sobral, J.B., Notare, M.S.M.A.: An artificial immune based intrusion detection model for computer and telecommunication systems. Parallel Computing 30(5) (2004) 629\u2013646","journal-title":"Parallel Computing"},{"key":"20_CR7","doi-asserted-by":"crossref","unstructured":"Janeway Jr, C.A.: How the immune system recognizes invaders. life, death and the immune system. Scientific American 269(3) (1993) 72","DOI":"10.1038\/scientificamerican0993-72"},{"key":"20_CR8","doi-asserted-by":"crossref","unstructured":"Ou, C.M.: Multiagent-based computer virus detection systems: abstraction from dendritic cell algorithm with danger theory. Telecommunication Systems (2011) 1\u201311","DOI":"10.1007\/s11235-011-9512-6"},{"key":"20_CR9","doi-asserted-by":"crossref","unstructured":"Dasgupta, D.: An overview of artificial immune systems. In Dasgupta, D (Ed.), Artificial Immune Systems and Their Applications (1998) 3\u201319","DOI":"10.1007\/978-3-642-59901-9"},{"issue":"2","key":"20_CR10","doi-asserted-by":"crossref","first-page":"1574","DOI":"10.1016\/j.asoc.2010.08.024","volume":"11","author":"D. Dasgupta","year":"2011","unstructured":"Dasgupta, D., Yu, S., Nino, F.: Recent advances in artificial immune systems: models and applications. Applied Soft Computing 11(2) (2011) 1574\u20131587","journal-title":"Applied Soft Computing"},{"key":"20_CR11","unstructured":"De Castro, L.N., Timmis, J.: Artificial immune systems: a novel approach to pattern recognition. (2002) 67\u201384"},{"key":"20_CR12","unstructured":"de Castro, L.N., Timmis, J.: Artificial immune systems: a new computational intelligence approach. Springer Verlag (2002)"},{"key":"20_CR13","unstructured":"De Castro, L.N., Von Zuben, F.J.: Artificial immune systems: Part i\u2014basic theory and applications. Technical Report\u2014RT DCA 01\/99, School of Computing and Electrical Enginnering. State University of Campinas, Brazil (1999)"},{"key":"20_CR14","doi-asserted-by":"crossref","unstructured":"Bersini, H., Varela, F.J.: Hints for adaptive problem solving gleaned from immune networks. In: Parallel problem solving from nature. Springer (1991) 343\u2013354","DOI":"10.1007\/BFb0029775"},{"issue":"2","key":"20_CR15","first-page":"166","volume":"1","author":"H. Bersini","year":"1994","unstructured":"Bersini, H., Varela, F.: The immune learning mechanisms: reinforcement, recruitment and their applications. Computing with Biological Metaphors 1(2) (1994) 166\u2013192","journal-title":"Computing with Biological Metaphors"},{"key":"20_CR16","unstructured":"Stibor, T., Timmis, J., Eckert, C.: The link between r-contiguous detectors and k-cnf satisfiability. In: Evolutionary Computation, 2006. CEC 2006. IEEE Congress on, IEEE (2006) 491\u2013498"},{"issue":"2","key":"20_CR17","doi-asserted-by":"crossref","first-page":"223","DOI":"10.1162\/evco.2007.15.2.223","volume":"15","author":"Z. Ji","year":"2007","unstructured":"Ji, Z., Dasgupta, D.: Revisiting negative selection algorithms. Evolutionary Computation 15(2) (2007) 223\u2013251","journal-title":"Evolutionary Computation"},{"key":"20_CR18","unstructured":"Majd, Mahshid, A.H., Hashemi, S.: A polymorphic convex hull scheme for negative selection algorithms. International Journal of Innovative Computing, Information and Control 8(5A) (2012) 2953\u20132964"},{"key":"20_CR19","doi-asserted-by":"crossref","unstructured":"Ji, Z., Dasgupta, D.: Real-valued negative selection algorithm with variable-sized detectors. In: Genetic and Evolutionary Computation\u2014GECCO 2004, Springer (2004) 287\u2013298","DOI":"10.1007\/978-3-540-24854-5_30"},{"issue":"5","key":"20_CR20","doi-asserted-by":"crossref","first-page":"1691","DOI":"10.1073\/pnas.90.5.1691","volume":"90","author":"J.K. Percus","year":"1993","unstructured":"Percus, J.K., Percus, O.E., Perelson, A.S.: Predicting the size of the t-cell receptor and antibody combining region from consideration of eficient self-nonself discrimination. Proceedings of the National Academy of Sciences 90(5) (1993) 1691\u20131695","journal-title":"Proceedings of the National Academy of Sciences"},{"key":"20_CR21","doi-asserted-by":"crossref","unstructured":"Holland, J.H., Holyoak, K.J., Nisbett, R.E., Thagard, P.R.: Induction: Processes of inference, learning, and discovery. computational models of cognition and perception (1986)","DOI":"10.7551\/mitpress\/3729.001.0001"},{"key":"20_CR22","unstructured":"Balthrop, J., Esponda, F., Forrest, S., Glickman, M.: Coverage and generalization in an artificial immune system. In: Proceedings of the Genetic and Evolutionary Computation Conference, Citeseer (2002) 3\u201310"},{"key":"20_CR23","first-page":"373","volume":"125C","author":"N.K. Jerne","year":"1974","unstructured":"Jerne, N.K.: Towards the network theory of the immune system. Ann. Immunol.(Inst. Pasteur) 125C (1974) 373\u2013389","journal-title":"Ann. Immunol.(Inst. Pasteur)"},{"key":"20_CR24","doi-asserted-by":"crossref","unstructured":"Harmer, P.K., Williams, P.D., Gunsch, G.H., Lamont, G.B.: An artificial immune system architecture for computer security applications. Evolutionary computation, IEEE transactions on 6(3) (2002) 252\u2013280 10","DOI":"10.1109\/TEVC.2002.1011540"},{"issue":"3","key":"20_CR25","first-page":"29","volume":"4","author":"J. Chen","year":"2007","unstructured":"Chen, J., Yang, D., Naofumi, M.: A study of detector generation algorithms based on artificial immune in intrusion detection system. WSEAS TRANSACTIONS on BIOLOGY and BIOMEDICINE 4(3) (2007) 29\u201335","journal-title":"WSEAS TRANSACTIONS on BIOLOGY and BIOMEDICINE"},{"key":"20_CR26","unstructured":"Han, J., Kamber, M., Pei, J.: Data Mining: Concepts and Techniques. Morgan Kaufmann (2011)"},{"key":"20_CR27","doi-asserted-by":"crossref","unstructured":"Dasgupta, D., KrishnaKumar, K., Wong, D., Berry, M.: Negative selection algorithm for aircraft fault detection. In: Artificial Immune Systems. Springer (2004) 1\u201313","DOI":"10.1007\/978-3-540-30220-9_1"},{"key":"20_CR28","unstructured":"Hamaker, J.S., Boggess, L.: Non-euclidean distance measures in airs, an artificial immune classification system. In: Evolutionary Computation, 2004. CEC2004. Congress on. Volume 1., IEEE (2004) 1067\u20131073"},{"key":"20_CR29","unstructured":"D\u2019Haeseleer, P., Forrest, S., et al.: An immunological approach to change detection. In: Proc. of IEEE Symposium on Research in Security and Privacy, Oakland, CA. (1996)"},{"key":"20_CR30","unstructured":"Ayara, M., Timmis, J., de Lemos, R., de Castro, L.N., Duncan, R.: Negative selection: How to generate detectors. In: Proceedings of the 1st International Conference on Artificial Immune Systems (ICARIS). Volume 1., Canterbury, UK:[sn] (2002) 89\u201398"},{"key":"20_CR31","unstructured":"D\u2019Haeseleer, P., Forrest, S., Helman, P.: An immunological approach to change detection: Algorithms, analysis and implications. In: Security and Privacy, 1996. Proceedings., 1996 IEEE Symposium on, IEEE (1996) 110\u2013119"},{"issue":"3","key":"20_CR32","first-page":"1","volume":"1","author":"S.T. Wierzchon","year":"2000","unstructured":"Wierzchon, S.T.: Discriminative power of the receptors activated by k-contiguous bits rule. Journal of Computer Science & Technology 1(3) (2000) 1\u201313","journal-title":"Journal of Computer Science & Technology"},{"key":"20_CR33","unstructured":"Yu, S., Adviser-Dasgupta, D.: Exploration of sense of self and humoral immunity for artificial immune systems: algorithms and applications. 361"},{"issue":"3","key":"20_CR34","first-page":"281","volume":"6","author":"D. Dasgupta","year":"2002","unstructured":"Dasgupta, D., Gonz\u00e1lez, F.: An immunity-based technique to characterize intrusions in computer networks. Evolutionary Computation, IEEE Transactions on 6(3) (2002) 281\u2013291","journal-title":"IEEE Transactions on"},{"issue":"4","key":"20_CR35","doi-asserted-by":"crossref","first-page":"383","DOI":"10.1023\/A:1026195112518","volume":"4","author":"F.A. Gonz\u00e1lez","year":"2003","unstructured":"Gonz\u00e1lez, F.A., Dasgupta, D.: Anomaly detection using real-valued negative selection. Genetic Programming and Evolvable Machines 4(4) (2003) 383\u2013403","journal-title":"Genetic Programming and Evolvable Machines"},{"key":"20_CR36","doi-asserted-by":"crossref","unstructured":"Balachandran, S., Dasgupta, D., Nino, F., Garrett, D.: A framework for evolving multi-shaped detectors in negative selection. In: Foundations of Computational Intelligence, 2007. FOCI 2007. IEEE Symposium on, IEEE (2007) 401\u2013408","DOI":"10.1109\/FOCI.2007.371503"},{"key":"20_CR37","doi-asserted-by":"crossref","unstructured":"Gonzalez, F., Dasgupta, D., Ni\u00f1o, L.F.: A randomized real-valued negative selection algorithm. In: Artificial Immune Systems. Springer (2003) 261\u2013272","DOI":"10.1007\/978-3-540-45192-1_25"},{"key":"20_CR38","doi-asserted-by":"crossref","unstructured":"Ma, W., Tran, D., Sharma, D.: A practical study on shape space and its occupancy in negative selection. In: Evolutionary Computation (CEC), 2010 IEEE Congress on, IEEE (2010) 1\u20137","DOI":"10.1109\/CEC.2010.5586266"}],"container-title":["Lecture Notes in Electrical Engineering","Proceedings of the First International Conference on Advanced Data and Information Engineering (DaEng-2013)"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-4585-18-7_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T05:33:45Z","timestamp":1746077625000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-4585-18-7_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,12,15]]},"ISBN":["9789814585170","9789814585187"],"references-count":38,"URL":"https:\/\/doi.org\/10.1007\/978-981-4585-18-7_20","relation":{},"ISSN":["1876-1100","1876-1119"],"issn-type":[{"type":"print","value":"1876-1100"},{"type":"electronic","value":"1876-1119"}],"subject":[],"published":{"date-parts":[[2013,12,15]]},"assertion":[{"value":"15 December 2013","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}