{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T03:23:34Z","timestamp":1761708214443},"reference-count":17,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2008,6,20]],"date-time":"2008-06-20T00:00:00Z","timestamp":1213920000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Appl Intell"],"published-print":{"date-parts":[[2010,2]]},"DOI":"10.1007\/s10489-008-0132-0","type":"journal-article","created":{"date-parts":[[2008,6,19]],"date-time":"2008-06-19T12:50:56Z","timestamp":1213879856000},"page":"1-26","source":"Crossref","is-referenced-by-count":24,"title":["Detecting interest cache poisoning in sensor networks using an\u00a0artificial immune algorithm"],"prefix":"10.1007","volume":"32","author":[{"given":"Christian","family":"Wallenta","sequence":"first","affiliation":[]},{"given":"Jungwon","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Peter J.","family":"Bentley","sequence":"additional","affiliation":[]},{"given":"Stephen","family":"Hailes","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2008,6,20]]},"reference":[{"key":"132_CR1","doi-asserted-by":"crossref","first-page":"991","DOI":"10.1146\/annurev.iy.12.040194.005015","volume":"12","author":"P Matzinger","year":"1994","unstructured":"Matzinger\u00a0P (1994) Tolerance, danger and the extended family. Annu Rev Immunol 12:991\u20131045","journal-title":"Annu Rev Immunol"},{"key":"132_CR2","unstructured":"Aickelin\u00a0U., Bentley\u00a0P., Cayzer\u00a0S, Kim\u00a0J, McLeod\u00a0J (2003) Danger theory: the link between AIS and IDS. In: Proceedings of the 2nd international conference on AIS (ICARIS-03), pp 147\u2013155"},{"key":"132_CR3","first-page":"153","volume-title":"Proceedings of ICARIS-05","author":"J Greensmith","year":"2005","unstructured":"Greensmith\u00a0J, Aickelin\u00a0U, Cayzer\u00a0S (2005) Introducing dendritic cells as a novel immune-inspired algorithm for intrusion detection. In: Proceedings of ICARIS-05. Springer, Berlin, pp 153\u2013167"},{"key":"132_CR4","doi-asserted-by":"crossref","unstructured":"Greensmith\u00a0J, Twycross\u00a0J, Aickelin\u00a0U (2006) Dendritic cells for anomaly detection. In: Proceedings of IEEE congress on evolutionary computation (CEC-06), Vancouver, Canada","DOI":"10.1109\/CEC.2006.1688374"},{"key":"132_CR5","first-page":"139","volume-title":"Proceedings of the 3rd international conference on AIS (ICARIS-05)","author":"P Bentley","year":"2005","unstructured":"Bentley\u00a0P, Greensmith\u00a0J, Ujjin\u00a0S (2005) Two ways to grow tissue for AIS. In: Proceedings of the 3rd international conference on AIS (ICARIS-05). Springer, Berlin, pp 139\u2013152"},{"key":"132_CR6","doi-asserted-by":"crossref","unstructured":"Kim\u00a0J, Wilson\u00a0W, Aickelin\u00a0U, McLeod\u00a0J (2005) Cooperative automated worm response and detection ImmuNe algorithm (CARDINAL) inspired by T-cell immunity and tolerance. In: Proceedings of the 3rd international conference on AIS (ICARIS-05), pp 168\u2013181","DOI":"10.1007\/11536444_13"},{"key":"132_CR7","first-page":"153","volume-title":"Proceedings of the 3rd international conference on AIS (ICARIS-05)","author":"J Twycross","year":"2005","unstructured":"Twycross\u00a0J, Aickelin\u00a0U (2005) Towards a conceptual framework for innate immunity. In: Proceedings of the 3rd international conference on AIS (ICARIS-05). Springer, Berlin, pp 153\u2013167"},{"key":"132_CR8","doi-asserted-by":"crossref","unstructured":"Twycross\u00a0J, Aickelin\u00a0U (2006) LIBTISSUE\u2014implementing innate immunity. In: Proceedings of the CEC-06, Vancouver, Canada","DOI":"10.1109\/CEC.2006.1688351"},{"key":"132_CR9","first-page":"342","volume-title":"Proceedings of the 2nd international conference on AIS (ICARIS-04)","author":"S Sarafijanovic","year":"2005","unstructured":"Sarafijanovic\u00a0S, Le Boudec\u00a0J (2005) An AIS for misbehaviour detection in mobile ad-hoc networks with virtual thymus, clustering, danger signals and memory detectors. In: Proceedings of the 2nd international conference on AIS (ICARIS-04). Springer, Berlin, pp 342\u2013356"},{"key":"132_CR10","doi-asserted-by":"crossref","unstructured":"Greensmith\u00a0J et al (2006) Articulation and clarification of the dendritic cell algorithm. In: Proceedings of ICARIS-2006","DOI":"10.1007\/11823940_31"},{"issue":"1","key":"132_CR11","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1109\/TNET.2002.808417","volume":"11","author":"C Intanagonwiwat","year":"2003","unstructured":"Intanagonwiwat\u00a0C et al. (2003) Directed diffusion for wireless sensor networking. IEEE\/ACM Trans Netw 11(1):2\u201316","journal-title":"IEEE\/ACM Trans Netw"},{"key":"132_CR12","doi-asserted-by":"crossref","unstructured":"Akyildiz\u00a0IF et al (2002) A\u00a0survey on sensor networks. IEEE Commun Mag August:102\u2013114","DOI":"10.1109\/MCOM.2002.1024422"},{"key":"132_CR13","doi-asserted-by":"crossref","unstructured":"Estrin\u00a0D, Cullar\u00a0D, Pister\u00a0K, Sukhatme\u00a0G (2002) Connecting the physical world with pervasive networks. In: Pervasive computing, pp 59\u201369","DOI":"10.1109\/MPRV.2002.993145"},{"key":"132_CR14","unstructured":"Karlof\u00a0C, Wagner\u00a0D (2004) Secure routing in wireless sensor networks: attacks and countermeasures. In: Ad hoc networks, pp\u00a0293\u2013315"},{"key":"132_CR15","unstructured":"Wallenta\u00a0C (2006) Detecting malicious activities in directed diffusion based sensor networks. Diploma thesis, System Architecture Group, Department of Computer Science, Universit\u00e4t Karlsruhe"},{"key":"132_CR16","doi-asserted-by":"crossref","unstructured":"Mati\u00a0S, Giuli\u00a0T, Lai\u00a0K, Baker\u00a0M (2000) Mitigating routing misbehaviour in mobile ad hoc networks","DOI":"10.1145\/345910.345955"},{"key":"132_CR17","unstructured":"Lioy\u00a0A, Maino\u00a0F, Marian\u00a0M, Mazzocchi\u00a0D (2000) In: DNS security, TERENA networking conference"}],"container-title":["Applied Intelligence"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-008-0132-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10489-008-0132-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-008-0132-0","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,29]],"date-time":"2019-05-29T18:25:42Z","timestamp":1559154342000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10489-008-0132-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,6,20]]},"references-count":17,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2010,2]]}},"alternative-id":["132"],"URL":"https:\/\/doi.org\/10.1007\/s10489-008-0132-0","relation":{},"ISSN":["0924-669X","1573-7497"],"issn-type":[{"value":"0924-669X","type":"print"},{"value":"1573-7497","type":"electronic"}],"subject":[],"published":{"date-parts":[[2008,6,20]]}}}