{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T13:00:28Z","timestamp":1773147628608,"version":"3.50.1"},"reference-count":113,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2008,1,10]],"date-time":"2008-01-10T00:00:00Z","timestamp":1199923200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Evol. Intel."],"published-print":{"date-parts":[[2008,3]]},"DOI":"10.1007\/s12065-007-0004-2","type":"journal-article","created":{"date-parts":[[2008,1,9]],"date-time":"2008-01-09T12:30:21Z","timestamp":1199881821000},"page":"5-26","source":"Crossref","is-referenced-by-count":74,"title":["An interdisciplinary perspective on artificial immune systems"],"prefix":"10.1007","volume":"1","author":[{"given":"J.","family":"Timmis","sequence":"first","affiliation":[]},{"given":"P.","family":"Andrews","sequence":"additional","affiliation":[]},{"given":"N.","family":"Owens","sequence":"additional","affiliation":[]},{"given":"E.","family":"Clark","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2008,1,10]]},"reference":[{"key":"4_CR1","doi-asserted-by":"crossref","unstructured":"Aickelin U, Bentley P, Cayzer S, Kim J, McLeod J (2003) Danger theory: the link between AIS and IDS? In: Timmis J, Bentley P, Hart E (eds) Proceedings of the 2nd International Conference on Artificial Immune Systems (ICARIS 2003), LNCS 2787. Springer, Berlin, pp 147\u2013155","DOI":"10.1007\/978-3-540-45192-1_15"},{"issue":"3","key":"4_CR2","doi-asserted-by":"crossref","first-page":"231","DOI":"10.1006\/smim.2000.0236","volume":"12","author":"CC Anderson","year":"2000","unstructured":"Anderson CC, Matzinger P (2000) Danger: the view from the bottom of the cliff. Semin Immunol 12(3):231\u2013238","journal-title":"Semin Immunol"},{"key":"4_CR3","doi-asserted-by":"crossref","unstructured":"Andrews PS, Timmis J (2005) Inspiration for the next generation of artificial immune systems. In: Jacob C, Pilat M, Bentley P, Timmis J (eds) Proc of the 4th International Conference on Artificial Immune Systems (ICARIS), Lecture Notes in Computer Science, vol 3627. Springer, Berlin, pp 126\u2013138","DOI":"10.1007\/11536444_10"},{"key":"4_CR4","unstructured":"Andrews PS, Timmis J (2005) diversity and artificial immune systems: incorporating a diversity operator into aiNet. In: Proceedings of the International Conference on Natural and Artificial Immune Systems (NAIS05), LNCS, vol 391. Springer, Berlin, pp 293\u2013306"},{"key":"4_CR5","unstructured":"Andrews PS, Timmis J (2006) A computational model of degeneracy in a lymph node. LNCS, Springer, Berlin, pp 164\u2013177"},{"key":"4_CR6","unstructured":"Balthrop J, Esponda F, Forrest S, Glickman M (2002) Coverage and generalisation in an artificial immune system. In: Genetic and evolutionary computation, pp 3\u201310"},{"key":"4_CR7","unstructured":"Bersini H (2002) Self-assertion versus self-recognition: a tribute to Francisco Varela. In: Timmis J, Bentley PJ (eds) Proceedings of the 1st International Conference on Artificial Immune Systems (ICARIS 2002). University of Kent Printing Unit, pp 107\u2013112"},{"key":"4_CR8","doi-asserted-by":"crossref","unstructured":"Bersini H (2006) Immune system modeling: the OO way. In: Bersini H, Carneiro J (eds) Proceedings of the 5th International Conference on Artificial Immune Systems, LNCS, vol 4163. Springer, Berlin, pp 150\u2013163","DOI":"10.1007\/11823940_12"},{"key":"4_CR9","doi-asserted-by":"crossref","unstructured":"Bersini H, Carneiro J (eds) (2006) Proceedings of the 5th International Conference on Artificial Immune Systems, LNCS, vol 4163. Springer, Berlin","DOI":"10.1007\/11823940"},{"key":"4_CR10","doi-asserted-by":"crossref","unstructured":"Bezerra G, Barra T, de Castro LN, Von Zuben F (2005) Adaptive radius immune algorithm for data clustering. In: Jacob C, Pilat M, Bentley P, Timmis J (eds) Proc of the 4th International Conference on Artificial Immune Systems (ICARIS), Lecture Notes in Computer Science, vol 3627. Springer, Berlin, pp 290\u2013303","DOI":"10.1007\/11536444_22"},{"issue":"3","key":"4_CR11","doi-asserted-by":"crossref","first-page":"221","DOI":"10.1006\/smim.2000.0235","volume":"12","author":"P Bretscher","year":"2000","unstructured":"Bretscher P (2000) Contemporary models for peripheral tolerance and the classical \u2018historical postulate\u2019. Semin Immunol 12(3):221\u2013229","journal-title":"Semin Immunol"},{"key":"4_CR12","doi-asserted-by":"crossref","unstructured":"Burnet FM (1959) The clonal selection theory of acquired immunity. Cambridge University Press, Cambridge","DOI":"10.5962\/bhl.title.8281"},{"key":"4_CR13","doi-asserted-by":"crossref","unstructured":"de Castro LN, Von Zuben FJ (2000) An evolutionary immune network for data clustering. In: Proceeding of the IEEE Brazilian Symposium on Artificial Neural Networks, pp 84\u201389","DOI":"10.1109\/SBRN.2000.889718"},{"issue":"3","key":"4_CR14","doi-asserted-by":"crossref","first-page":"239","DOI":"10.1109\/TEVC.2002.1011539","volume":"6","author":"LN Castro de","year":"2002","unstructured":"de Castro LN, Von Zuben FJ (2002) Learning and optimization using the clonal selection principle. IEEE Trans Evol Comput 6(3):239\u2013251","journal-title":"IEEE Trans Evol Comput"},{"key":"4_CR15","doi-asserted-by":"crossref","unstructured":"Clark E, Hone A, Timmis J (2005) A markov chain model of the b-cell algorithm. In: Jacob C, Pilat M, Bentley P, Timmis J (eds) Proc of the 4th International Conference on Artificial Immune Systems (ICARIS), Lecture Notes in Computer Science, vol 3627. Springer, Berlin, pp 318\u2013330","DOI":"10.1007\/11536444_24"},{"key":"4_CR16","doi-asserted-by":"crossref","unstructured":"Coelho G, Von Zuben FJ (2006) Omni-ainet: an immune-inspired approach for omni optimization. In: Bersini H, Carneiro J (eds) Proceedings of the 5th International Conference on Artificial Immune Systems, LNCS, vol 4163. Springer, Berlin, pp 294\u2013308","DOI":"10.1007\/11823940_23"},{"issue":"3","key":"4_CR17","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1006\/smim.2000.0234","volume":"12","author":"IR Cohen","year":"2000","unstructured":"Cohen IR (2000) Discrimination and dialogue in the immune system. Semin Immunol 12(3):215\u2013219","journal-title":"Semin Immunol"},{"key":"4_CR18","doi-asserted-by":"crossref","unstructured":"Cohen IR (2000) Tending Adam\u2019s garden: evolving the cognitive immune self. Elsevier, Amsterdam","DOI":"10.1016\/B978-012178355-6\/50030-5"},{"key":"4_CR19","first-page":"569","volume":"7","author":"IR Cohen","year":"2007","unstructured":"Cohen IR (2007) Real and artificial immune systems: computing the state of the body. Imm Rev 7:569\u2013574","journal-title":"Imm Rev"},{"key":"4_CR20","doi-asserted-by":"crossref","unstructured":"Cohen IR, Harel D (2006) Explaining a complex living system: dynamics, multi-scaling and emergence","DOI":"10.1098\/rsif.2006.0173"},{"key":"4_CR21","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1111\/j.1365-3083.1995.tb03619.x","volume":"42","author":"A Coutinho","year":"1995","unstructured":"Coutinho A (1995) The network theory: 21\u00a0years later. Scand J Immunol 42:3\u20138","journal-title":"Scand J Immunol"},{"key":"4_CR22","unstructured":"Cruz Cortes N, Coello Coello C (2003) Multiobjective optimisation using ideas from the clonal selection principle. In: Cantu-Paz E (ed) Genetic and Evolutionary Computation (GECCO), vol 1, pp 158\u2013170"},{"key":"4_CR23","doi-asserted-by":"crossref","unstructured":"Cutello V, Nicosia G (2004) The clonal selection principle for in silico and in vitro computing. In: de Castro LN, von Zuben FJ (eds) Recent Developments in Biologically Inspired Computing. Idea Group Publishing, Hershey, PA","DOI":"10.4018\/978-1-59140-312-8.ch006"},{"key":"4_CR24","doi-asserted-by":"crossref","unstructured":"Cutello V, Nicosia G, Oliveto P, Romeo M (2007) On the convergence of immune algorithms. In: Proc of Foundations of Computational Intelligence, pp 409\u2013416","DOI":"10.1109\/FOCI.2007.371504"},{"key":"4_CR25","doi-asserted-by":"crossref","unstructured":"Dasgupta D (ed) (1999) Artificial immune systems and their applications. Springer, Berlin","DOI":"10.1007\/978-3-642-59901-9"},{"key":"4_CR26","doi-asserted-by":"crossref","unstructured":"Dasgupta D, Krishna Kumar K, Wong D, Berry M (2004) Negative selection algorithm for aircraft fault detection. In: Nicosia G, Cutello V, Bentley PJ, Timmis J (eds) Proceedings of the 3rd International Conference on Artificial Immune Systems (ICARIS 2004), LNCS 3239. Springer, Berlin, pp 1\u201314","DOI":"10.1007\/978-3-540-30220-9_1"},{"key":"4_CR27","doi-asserted-by":"crossref","unstructured":"Davoudani D, Hart E, Paechter B (2007) An immune-inspired approach to speckled computing. In: de Castro LN, Von Zuben FJ, Knidel H (eds) Proceedings of the 6th International Conference on Artificial Immune Systems, Lecture Notes in Computer Science, vol 4628. Springer, Berlin, pp 288\u2013299","DOI":"10.1007\/978-3-540-73922-7_25"},{"key":"4_CR28","unstructured":"de Castro LN, Timmis J (2002) Artificial immune systems: a new computational intelligence approach. Springer, Berlin"},{"key":"4_CR29","unstructured":"de Castro LN, Von Zuben FJ (1999) Artificial immune systems: Part I\u2014basic theory and applications. Tech Rep DCA-RT 01\/99, School of Computing and Electrical Engineering, State University of Campinas, Brazil"},{"key":"4_CR30","unstructured":"de Castro LN, Von Zuben FJ (2000) Artificial immune systems: Part II\u2014a survey of applications. Tech Rep DCA-RT 02\/00, School of Computing and Electrical Engineering, State University of Campinas, Brazil"},{"key":"4_CR31","unstructured":"de Castro LN, Von Zuben FJ, Knidel H (eds) (2007) Proceedings of the 6th International Conference on Artificial Immune Systems, Lecture Notes in Computer Science, vol 4628. Springer, Berlin, pp 119\u2013130"},{"issue":"5","key":"4_CR32","doi-asserted-by":"crossref","first-page":"873","DOI":"10.1109\/TSMCC.2007.900662","volume":"37","author":"R Lemos de","year":"2007","unstructured":"de Lemos R, Timmis J, Forrest S, Ayara M (2007) Immune-inspired adaptable error detection for automated teller machines. IEEE Trans Syst Man Cybern C Appl Rev 37(5):873\u2013886","journal-title":"IEEE Trans Syst Man Cybern C Appl Rev"},{"issue":"1","key":"4_CR33","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1016\/0022-5193(78)90185-6","volume":"73","author":"L Edelstein","year":"1978","unstructured":"Edelstein L, Rosen R (1978) Enzyme-substrate recognition. J Theor Biol 73(1):181\u2013204","journal-title":"J Theor Biol"},{"key":"4_CR34","unstructured":"Esponda F (2005) Negative representations of information. Ph.D. thesis, University of New Mexico"},{"issue":"3","key":"4_CR35","first-page":"201","volume":"1","author":"F Esponda","year":"2005","unstructured":"Esponda F, Ackley ES, Forrest S, Helman P (2005) On-line negative databases (with experimental results). Int J Unconventional Comput 1(3):201\u2013220","journal-title":"Int J Unconventional Comput"},{"key":"4_CR36","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1016\/0167-2789(90)90072-W","volume":"42","author":"JD Farmer","year":"1990","unstructured":"Farmer JD (1990) A rossetta stone for connectionism. Physica D 42:153\u2013187","journal-title":"Physica D"},{"key":"4_CR37","doi-asserted-by":"crossref","first-page":"187","DOI":"10.1016\/0167-2789(86)90240-X","volume":"22","author":"JD Farmer","year":"1986","unstructured":"Farmer JD, Packard NH, Perelson AS (1986) The immune system, adaptation, and machine learning. Physica D 22:187\u2013204","journal-title":"Physica D"},{"key":"4_CR38","unstructured":"Folwer M (2004) UML Distilled. Addison-Wesley, Reading, MA"},{"issue":"1","key":"4_CR39","doi-asserted-by":"crossref","first-page":"176","DOI":"10.1111\/j.1600-065X.2007.00499.x","volume":"216","author":"S Forrest","year":"2007","unstructured":"Forrest S, Beauchemin C (2007) Computer immunology. Immunol Rev 216(1):176\u2013197","journal-title":"Immunol Rev"},{"key":"4_CR40","doi-asserted-by":"crossref","unstructured":"Forrest S, Perelson A, Allen L, Cherukuri R (1994) Self\u2013nonself discrimination in a computer. In: Proceedings of the IEEE Symposium on Research Security and Privacy, pp 202\u2013212","DOI":"10.1109\/RISP.1994.296580"},{"issue":"4","key":"4_CR41","doi-asserted-by":"crossref","first-page":"521","DOI":"10.1109\/TEVC.2006.884042","volume":"11","author":"A Freitas","year":"2007","unstructured":"Freitas A, Timmis J (2007) Revisiting the foundations of artificial immune systems for data mining. IEEE Trans Evol Comp 11(4):521\u2013540","journal-title":"IEEE Trans Evol Comp"},{"key":"4_CR42","unstructured":"Gamma E, Helm R, Johnson R, Vlissides J (1995) Design patterns. Addison-Wesley, Reading, MA"},{"issue":"2","key":"4_CR43","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1162\/1063656054088512","volume":"13","author":"S Garrett","year":"2005","unstructured":"Garrett S (2005) How do we evaluate artificial immune systems? Evol Comput 13(2):145\u2013177","journal-title":"Evol Comput"},{"key":"4_CR44","doi-asserted-by":"crossref","first-page":"1307","DOI":"10.1038\/nm1159","volume":"10","author":"RN Germain","year":"2004","unstructured":"Germain RN (2004) An innately interesting decade of research in immunology. Nat Med 10:1307\u20131320","journal-title":"Nat Med"},{"issue":"25","key":"4_CR45","doi-asserted-by":"crossref","first-page":"2340","DOI":"10.1021\/j100540a008","volume":"81","author":"D Gillespie","year":"1977","unstructured":"Gillespie D (1977) Approximate accelerated stochastic simulation of chemically reacting systems. J Phys Chem 81(25):2340\u20132361","journal-title":"J Phys Chem"},{"key":"4_CR46","unstructured":"Goldsby RA, Kindt TJ, Osborne BA, Kuby J (2003) Immunology, 5th edn. W. H. Freeman and Company, San Francisco"},{"key":"4_CR47","doi-asserted-by":"crossref","unstructured":"Gonz\u00e1lez F, Dasgupta D, G\u00f3mez J (2003) The effect of binary matching rules in negative selection. In: Genetic and Evolutionary Computation\u2014GECCO-2003, Lecture Notes in Computer Science, vol 2723. Springer, Chicago, pp 195\u2013206","DOI":"10.1007\/3-540-45105-6_25"},{"issue":"4","key":"4_CR48","doi-asserted-by":"crossref","first-page":"383","DOI":"10.1023\/A:1026195112518","volume":"4","author":"FA Gonzalez","year":"2003","unstructured":"Gonzalez FA, Dasgupta D (2003) Anomaly detection using real-valued negative selection. Genet Program Evolvable Machines 4(4):383\u2013403","journal-title":"Genet Program Evolvable Machines"},{"key":"4_CR49","doi-asserted-by":"crossref","unstructured":"Greensmith J, Aickelin U, Cayzer S (2005) Introducing dendritic cells as a novel immune-inspired algorithm for anomaly detection. In: Jacob C, Pilat M, Bentley P, Timmis J (eds) Proc of the 4th International Conference on Artificial Immune Systems (ICARIS), Lecture Notes in Computer Science, vol 3627. Springer, Berlin","DOI":"10.1007\/11536444_12"},{"key":"4_CR50","doi-asserted-by":"crossref","unstructured":"Greensmith J, Aickelin U, Twycross J (2006) Articulation and clarification of the dendritic cell algorithm. In: Bersini H, Carneiro J (eds) Proceedings of the 5th International Conference on Artificial Immune Systems, LNCS, vol 4163. Springer, Berlin, 404\u2013417","DOI":"10.1007\/11823940_31"},{"issue":"3","key":"4_CR51","doi-asserted-by":"crossref","first-page":"197","DOI":"10.1006\/smim.2000.0232","volume":"12","author":"Z Grossman","year":"2000","unstructured":"Grossman Z, Paul WE (2000) Self-tolerance: context dependent tuning of T cell antigen recognition. Semin Immunol 12(3):197\u2013203","journal-title":"Semin Immunol"},{"key":"4_CR52","doi-asserted-by":"crossref","unstructured":"Guzella T, Mota-Santos T, Caminhas W (2007) Towards a novel immune inspired approach to temporal anomaly detection. In: de Castro LN, Von Zuben FJ, Knidel H (eds) Proceedings of the 6th International Conference on Artificial Immune Systems, Lecture Notes in Computer Science, vol 4628. Springer, Berlin, pp 119\u2013130","DOI":"10.1007\/978-3-540-73922-7_11"},{"key":"4_CR53","doi-asserted-by":"crossref","unstructured":"Harel D (1987) Statecharts: a visual formalism for complex systems. Sci Comput Program 8:231\u2013274","DOI":"10.1016\/0167-6423(87)90035-9"},{"key":"4_CR54","doi-asserted-by":"crossref","unstructured":"Hart E (2005) Not all balls are round: an investigation of alternative recognition-region shapes. In: Jacob C, Pilat M, Bentley P, Timmis J (eds) Proc of the 4th International Conference on Artificial Immune Systems (ICARIS), Lecture Notes in Computer Science, vol 3627. Springer, Berlin, pp 29\u201342","DOI":"10.1007\/11536444_3"},{"key":"4_CR55","doi-asserted-by":"crossref","unstructured":"Hart E, Bersini H, Santos F (2006) Tolerance vs intolerance: how affinity defines topology in an idiotypic network. In: Bersini H, Carneiro J (eds) Proceedings of the 5th International Conference on Artificial Immune Systems, LNCS, vol 4163. Springer, Berlin, pp 109\u2013121","DOI":"10.1007\/11823940_9"},{"key":"4_CR56","doi-asserted-by":"crossref","unstructured":"Hart E, Ross P (2004) Studies on the implications of shape-space models for idiotypic networks. In: Nicosia G, Cutello V, Bentley PJ, Timmis J (eds) Proceedings of the 3rd International Conference on Artificial Immune Systems (ICARIS 2004), LNCS 3239. Springer, Berlin, pp 413\u2013426","DOI":"10.1007\/978-3-540-30220-9_33"},{"key":"4_CR57","doi-asserted-by":"crossref","unstructured":"Hart E, Santos F, Bersini H (2007) Topological constraints in the evolution of idiotypic networks. In: de Castro LN, Von Zuben FJ, Knidel H (eds) Proceedings of the 6th International Conference on Artificial Immune Systems, Lecture Notes in Computer Science, vol 4628. Springer, Berlin, pp 252\u2013263","DOI":"10.1007\/978-3-540-73922-7_22"},{"key":"4_CR58","doi-asserted-by":"crossref","unstructured":"Hart E, Timmis J (2005) Application areas of AIS: the past, the present and the future. In: Jacob C, Pilat M, Bentley P, Timmis J (eds) Proc of the 4th International Conference on Artificial Immune Systems (ICARIS), Lecture Notes in Computer Science, vol 3627. Springer, Berlin, pp 483\u2013497","DOI":"10.1007\/11536444_37"},{"key":"4_CR59","unstructured":"Hart E, Timmis J (2007) Application areas of AIS: the past, the present and the future. To appear in Applied Soft Computing. In Press, Corrected Proof, Available online 12 February 2007"},{"issue":"1","key":"4_CR60","first-page":"1289","volume":"7","author":"S Hofmeyr","year":"2000","unstructured":"Hofmeyr S, Forrest S (2000) Architecture for an artificial immune system. Evol Comput 7(1):1289\u20131296","journal-title":"Evol Comput"},{"key":"4_CR61","unstructured":"Hone A, van den Berg HA (2007) Modelling a cytokine network. In: Proc of IEEE Workshop on Computational Intelligence, pp 389\u2013293"},{"key":"4_CR62","unstructured":"Honorio L, Leite da Silva A, Barbosa D (2007) A gradient-based artificial immune system applied to optimal power flow problems. In: de Castro LN, Von Zuben FJ, Knidel H (eds) Proceedings of the 6th International Conference on Artificial Immune Systems, Lecture Notes in Computer Science, vol 4628. Springer, Berlin, pp 1\u201312"},{"key":"4_CR63","doi-asserted-by":"crossref","unstructured":"Jacob C, Pilat M, Bentley P, Timmis J (eds) (2005) Proc of the 4th International Conference on Artificial Immune Systems (ICARIS), Lecture Notes in Computer Science, vol 3627. Springer, Berlin","DOI":"10.1007\/11536444"},{"key":"4_CR64","unstructured":"Janeway C, Travers P, Walport M, Shlomchik M (2004) Immunobiology: the immune system is health and disease, 6th edn. Garland Science, New York"},{"key":"4_CR65","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1016\/0167-5699(92)90198-G","volume":"13","author":"CA Janeway","year":"1992","unstructured":"Janeway CA (1992) The immune system evolved to discriminate infectious nonself from noninfectious self. Immunol Today 13:11\u201316","journal-title":"Immunol Today"},{"key":"4_CR66","unstructured":"Janeway CA, Travers P, Walport M, Shlomchik M (2001) Immunobiology, 5th edn. Garland Publishing, New York"},{"key":"4_CR67","first-page":"373","volume":"125","author":"NK Jerne","year":"1974","unstructured":"Jerne NK (1974) Towards a network theory of the immune system. Ann Immunol (Inst Pasteur) 125C:373\u2013389","journal-title":"Ann Immunol (Inst Pasteur)"},{"key":"4_CR68","unstructured":"Ji Z, Dasgupta D (2003) Artificial immune system (AIS) research in the last five years. In: Congress on evolutionary computation, vol 1. IEEE, Canberra, Australia, pp 123\u2013130"},{"key":"4_CR69","unstructured":"Ji Z, Dasgupta D, Yang Z, Teng H (2006) Analysis of dental images using artificial immune systems. In: Proceedings of Congress on evolutionary computation (CEC). IEEE Press, Piscataway, NJ, pp 528\u2013535"},{"key":"4_CR70","doi-asserted-by":"crossref","unstructured":"Kelsey J, Timmis J (2003) Immune inspired somatic contiguous hypermutation for function optimisation. In: Genetic and evolutionary computation conference\u2014GECCO 2003. Springer, Berlin, pp 207\u2013218","DOI":"10.1007\/3-540-45105-6_26"},{"key":"4_CR71","doi-asserted-by":"crossref","unstructured":"Kim J, Bentley P, Aickelin U, Greensmith J, Tedesco G, Twycross J (2007) Immune system approaches to intrusion detection\u2014a review. Nat Comput (in print)","DOI":"10.1007\/s11047-006-9026-4"},{"issue":"3","key":"4_CR72","doi-asserted-by":"crossref","first-page":"343","DOI":"10.1006\/smim.2000.0252","volume":"12","author":"RE Langman","year":"2000","unstructured":"Langman RE, Cohn M (2000) Editorial summary. Semin Immunol 12(3):343\u2013344","journal-title":"Semin Immunol"},{"issue":"3","key":"4_CR73","doi-asserted-by":"crossref","first-page":"189","DOI":"10.1006\/smim.2000.0231","volume":"12","author":"RE Langman","year":"2000","unstructured":"Langman RE, Cohn M (2000) A minimal model for the self\u2013nonself discrimination: a return to basics. Semin Immunol 12(3):189\u2013195","journal-title":"Semin Immunol"},{"issue":"9","key":"4_CR74","doi-asserted-by":"crossref","first-page":"445","DOI":"10.1016\/S1471-4906(02)02281-0","volume":"23","author":"MB Lutz","year":"2002","unstructured":"Lutz MB, Schuler G (2002) Immature, semi-mature and fully mature dendritic cells: which signals induce tolerance or immunity? Trends Immunol 23(9):445\u2013449","journal-title":"Trends Immunol"},{"key":"4_CR75","doi-asserted-by":"crossref","first-page":"991","DOI":"10.1146\/annurev.iy.12.040194.005015","volume":"12","author":"P Matzinger","year":"1994","unstructured":"Matzinger P (1994) Tolerance, danger and the extended family. Ann Rev Immunol 12:991\u20131045","journal-title":"Ann Rev Immunol"},{"key":"4_CR76","doi-asserted-by":"crossref","first-page":"301","DOI":"10.1126\/science.1071059","volume":"296","author":"P Matzinger","year":"2002","unstructured":"Matzinger P (2002) The danger model: a renewed sense of self. Science 296:301\u2013305","journal-title":"Science"},{"key":"4_CR77","doi-asserted-by":"crossref","unstructured":"May P, Timmis J, Mander K (2007) Immune and evolutionary approaches to software mutation testing. In: de Castro LN, Von Zuben FJ, Knidel H (eds) Proceedings of the 6th International Conference on Artificial Immune Systems, Lecture Notes in Computer Science, vol 4628. Springer, Berlin, pp 336\u2013347","DOI":"10.1007\/978-3-540-73922-7_29"},{"key":"4_CR78","doi-asserted-by":"crossref","unstructured":"McEwan C, Hart E, Paechter B (2007) Revisiting the central and peripheral immune system. In: de Castro LN, Von Zuben FJ, Knidel H (eds) Proceedings of the 6th International Conference on Artificial Immune Systems, Lecture Notes in Computer Science, vol 4628. Springer, Berlin, pp 240\u2013251","DOI":"10.1007\/978-3-540-73922-7_21"},{"issue":"3","key":"4_CR79","doi-asserted-by":"crossref","first-page":"185","DOI":"10.1006\/smim.2000.0230","volume":"12","author":"R Medzhitov","year":"2000","unstructured":"Medzhitov R, Janeway CA (2000) How does the immune system distinguish self from nonself? Semin Immunol 12(3):185\u2013188","journal-title":"Semin Immunol"},{"key":"4_CR80","doi-asserted-by":"crossref","unstructured":"Mendao M, Timmis J, Andrews PS, Davies M (2007) The immune system in pieces: computational lessons from degeneracy in the immune system. In: Fogel DB (ed) Proc of foundations of computational intelligence, pp 394\u2013400","DOI":"10.1109\/FOCI.2007.371502"},{"key":"4_CR81","unstructured":"Milner R (1999) Communicating and mobile systems: the \u03c0-calculus. Cambridge University Press, Cambridge"},{"issue":"6","key":"4_CR82","first-page":"564","volume":"5","author":"TR Mosmann","year":"2004","unstructured":"Mosmann TR, Livingstone AM (2004) Dendritic cells: the immune information management experts. Science 5(6):564\u2013566","journal-title":"Science"},{"key":"4_CR83","unstructured":"Neal M, Trapnel B (2007) In silico immuonology, chap. Go Dutch: exploit interactions and environments with artificial immune systems. Springer, Berlin, pp 313\u2013330"},{"key":"4_CR84","doi-asserted-by":"crossref","unstructured":"Newborough R, Stepney S (2005) A generic framework for population based algorithms. In: Jacob C, Pilat M, Bentley P, Timmis J (eds) Proc of the 4th International Conference on Artificial Immune Systems (ICARIS), Lecture Notes in Computer Science, vol 3627. Springer, Berlin","DOI":"10.1007\/11536444_4"},{"key":"4_CR85","doi-asserted-by":"crossref","unstructured":"Nicosia G, Cutello V, Bentley PJ, Timmis J (eds) (2004) Proceedings of the 3rd International Conference on Artificial Immune Systems (ICARIS 2004), LNCS 3239. Springer, Berlin","DOI":"10.1007\/b100486"},{"key":"4_CR86","doi-asserted-by":"crossref","unstructured":"Owens N, Timmis J, Greensted A, Tyrrell A (2007) On immune inspired homeostasis for electronic systems. In: de Castro LN, Von Zuben FJ, Knidel H (eds) Proceedings of the 6th International Conference on Artificial Immune Systems, Lecture Notes in Computer Science, vol 4628. Springer, Berlin, pp 216\u2013227","DOI":"10.1007\/978-3-540-73922-7_19"},{"issue":"4","key":"4_CR87","doi-asserted-by":"crossref","first-page":"645","DOI":"10.1016\/0022-5193(79)90275-3","volume":"81","author":"AS Perelson","year":"1979","unstructured":"Perelson AS, Oster GF (1979) Theoretical studies of clonal selection: minimal antibody repertoire size and reliability of self\u2013non-self discrimination. J Theor Biol 81(4):645\u2013670","journal-title":"J Theor Biol"},{"key":"4_CR88","doi-asserted-by":"crossref","unstructured":"Phillips A, Cardelli L (2007) Efficient, correct simulation of biological processes in the stochastic pi-calculus. In: Proceedings of computational methods in systems biology (CMSB\u201907), vol 4695, pp 184\u2013199","DOI":"10.1007\/978-3-540-75140-3_13"},{"issue":"7","key":"4_CR89","doi-asserted-by":"crossref","first-page":"578","DOI":"10.1093\/comjnl\/38.7.578","volume":"38","author":"C Priami","year":"1995","unstructured":"Priami C (1995) Stochastic \u03c0-calculus. Comput J 38(7):578\u2013589","journal-title":"Comput J"},{"key":"4_CR90","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1016\/S0020-0190(01)00214-9","volume":"80","author":"C Priami","year":"2001","unstructured":"Priami C, Regev A, Shapiro E (2001) Application of a stochastic name-passing calculus to representation for biological processes in the stochastic \u03c0-calculus. Inform Process Lett 80:25\u201331","journal-title":"Inform Process Lett"},{"key":"4_CR91","unstructured":"Regev A, Silverman W, Shapiro E (2001) Representation and simulation of bio-chemical processes using the pi-calculus process algebra. In: Pacific symposium on biocomputing, vol 6, pp 459\u2013470"},{"issue":"1-4","key":"4_CR92","doi-asserted-by":"crossref","first-page":"67","DOI":"10.3233\/FI-1998-35123405","volume":"35","author":"G Rudolph","year":"1998","unstructured":"Rudolph G (1998) Finite markov chain results in evolutionary computation: a tour d\u2019horizon. Fundam Inf 35(1\u20134):67\u201389","journal-title":"Fundam Inf"},{"key":"4_CR93","doi-asserted-by":"crossref","unstructured":"Secker A, Freitas A (2007) Wairs: improving classification accuracy by weighting attributes in the airs classifier. In: Proceedings of the congress on evolutionary computation, pp 3759\u20133765","DOI":"10.1109\/CEC.2007.4424960"},{"key":"4_CR94","doi-asserted-by":"crossref","unstructured":"Secker A, Freitas A, Timmis J (2003) A danger theory inspired approach to web mining. In: Timmis J, Bentley P, Hart E (eds) Proceedings of the 2nd International Conference on Artificial Immune Systems (ICARIS 2003), LNCS 2787. Springer, Berlin, pp 156\u2013167","DOI":"10.1007\/978-3-540-45192-1_16"},{"issue":"3","key":"4_CR95","doi-asserted-by":"crossref","first-page":"173","DOI":"10.1006\/smim.2000.0228","volume":"12","author":"AM Silverstein","year":"2000","unstructured":"Silverstein AM, Rose NR (2000) There is only one immune system! The view from immunopathology. Semin Immunol 12(3):173\u2013178","journal-title":"Semin Immunol"},{"issue":"3","key":"4_CR96","first-page":"315","volume":"1","author":"S Stepney","year":"2006","unstructured":"Stepney S, Smith R, Timmis J, Tyrrell A, Neal M, Hone A (2006) Conceptual frameworks for artificial immune systems. Int J Unconventional Comput 1(3):315\u2013338","journal-title":"Int J Unconventional Comput"},{"key":"4_CR97","doi-asserted-by":"crossref","unstructured":"Stepney S, Smith RE, Timmis J, Tyrrell AM (2004) Towards a conceptual framework for artificial immune systems. In: Nicosia G, Cutello V, Bentley PJ, Timmis J (eds) Proceedings of the 3rd International Conference on Artificial Immune Systems (ICARIS 2004), LNCS 3239. Springer, Berlin, pp 53\u201364","DOI":"10.1007\/978-3-540-30220-9_5"},{"key":"4_CR98","unstructured":"Stibor T (2006) On the appropriateness of negative selection for anomaly detection and network intrusion detection. Ph.D. thesis, Darmstadt University of Technology"},{"key":"4_CR99","doi-asserted-by":"crossref","unstructured":"Stibor T (2007) Phase transition and the computational complexity of generating r-contiguous detectors. In: de Castro LN, Von Zuben FJ, Knidel H (eds) Proceedings of the 6th International Conference on Artificial Immune Systems, Lecture Notes in Computer Science, vol 4628. Springer, Berlin, pp 142\u2013155","DOI":"10.1007\/978-3-540-73922-7_13"},{"key":"4_CR100","doi-asserted-by":"crossref","unstructured":"Stibor T, Timmis J (2007) An investigation into the compression quality of ainet. In: Fogel D (ed) Proc of foundations of computational intelligence","DOI":"10.1109\/FOCI.2007.371518"},{"key":"4_CR101","doi-asserted-by":"crossref","unstructured":"Stibor T, Timmis J, Eckert C (2006) The link between r-contiguous detectors and k-cnf satisfiability. In: Proceedings of the congress on evolutionary computation, pp 491\u2013498","DOI":"10.1109\/CEC.2006.1688350"},{"issue":"3","key":"4_CR102","doi-asserted-by":"crossref","first-page":"241","DOI":"10.1006\/smim.2000.0237","volume":"12","author":"AI Tauber","year":"2000","unstructured":"Tauber AI (2000) Moving beyond the immune self? Semin Immunol 12(3):241\u2013248","journal-title":"Semin Immunol"},{"issue":"1","key":"4_CR103","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s11047-006-9029-1","volume":"6","author":"J Timmis","year":"2007","unstructured":"Timmis J (2007) Artificial immune systems: today and tomorow. Nat Comput 6(1):1\u201318","journal-title":"Nat Comput"},{"key":"4_CR104","doi-asserted-by":"crossref","unstructured":"Timmis J, Bentley P, Hart E (eds) (2003) Proceedings of the 2nd International Conference on Artificial Immune Systems (ICARIS 2003), LNCS 2787. Springer, Berlin","DOI":"10.1007\/b12020"},{"key":"4_CR105","doi-asserted-by":"crossref","unstructured":"Timmis J, Bentley PJ (eds) (2002) Proceedings of the 1st International Conference on Artificial Immune Systems (ICARIS 2002). University of Kent Printing Unit","DOI":"10.1007\/b12020"},{"key":"4_CR106","doi-asserted-by":"crossref","unstructured":"Timmis J, Hone A, Stibor T, Clark E (2007) Theoretical advances in artificial immune systems. J Theor Comput Sci (submitted)","DOI":"10.1016\/j.tcs.2008.02.011"},{"key":"4_CR107","unstructured":"Timmis J, Knight T (2001) Data mining: a heuristic approach, chap. Artificial immune systems: using the immune system as inspiration for data mining. Idea Group, Hershey, PA, pp 209\u2013230"},{"issue":"3\u20134","key":"4_CR108","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1016\/S0950-7051(01)00088-0","volume":"14","author":"J Timmis","year":"2001","unstructured":"Timmis J, Neal M (2001) A resource limited artificial immune system for data analysis. Knowl Based Syst 14(3\u20134):121\u2013130","journal-title":"Knowl Based Syst"},{"key":"4_CR109","doi-asserted-by":"crossref","unstructured":"Twycross J, Aickelin U (2005) Towards a conceptual framework for innate immunity. In: Jacob C, Pilat M, Bentley P, Timmis J (eds) Proc of the 4th International Conference on Artificial Immune Systems (ICARIS), Lecture Notes in Computer Science, vol 3627. Springer, Berlin, pp 112\u2013125","DOI":"10.1007\/11536444_9"},{"issue":"5","key":"4_CR110","doi-asserted-by":"crossref","first-page":"159","DOI":"10.1016\/S0167-5699(05)80046-5","volume":"12","author":"FJ Varela","year":"1991","unstructured":"Varela FJ, Coutinho A (1991) Second generation immune networks. Immunol Today 12(5):159\u2013166","journal-title":"Immunol Today"},{"key":"4_CR111","doi-asserted-by":"crossref","unstructured":"Villalobos-Arias M, Coello CAC, Hernandez-Lerma O (2004) Convergence analysis of a multiobjective artificial immune system algorithm. In: Nicosia G, Cutello V, Bentley PJ, Timmis J (eds) Proceedings of the 3rd International Conference on Artificial Immune Systems (ICARIS 2004), LNCS 3239. Springer, Berlin, pp 226\u2013235","DOI":"10.1007\/978-3-540-30220-9_19"},{"key":"4_CR112","doi-asserted-by":"crossref","unstructured":"Voigt D, Wirth H, Dilger W (2007) A computational models for the cognitive immune system theory based on learning classifier systems. In: de Castro LN, Von Zuben FJ, Knidel H (eds) Proceedings of the 6th International Conference on Artificial Immune Systems, Lecture Notes in Computer Science, vol 4628. Springer, Berlin, pp 264\u2013275","DOI":"10.1007\/978-3-540-73922-7_23"},{"issue":"1","key":"4_CR113","doi-asserted-by":"crossref","first-page":"291","DOI":"10.1023\/B:GENP.0000030197.83685.94","volume":"5","author":"A Watkins","year":"2004","unstructured":"Watkins A, Timmis J, Boggess L (2004) Artificial immune recognition system (AIRS): an immune-inspired supervised learning algorithm. Genet Program Evolvable Machines 5(1):291\u2013317","journal-title":"Genet Program Evolvable Machines"}],"container-title":["Evolutionary Intelligence"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12065-007-0004-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12065-007-0004-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12065-007-0004-2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,15]],"date-time":"2023-05-15T19:07:11Z","timestamp":1684177631000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12065-007-0004-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,1,10]]},"references-count":113,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2008,3]]}},"alternative-id":["4"],"URL":"https:\/\/doi.org\/10.1007\/s12065-007-0004-2","relation":{},"ISSN":["1864-5909","1864-5917"],"issn-type":[{"value":"1864-5909","type":"print"},{"value":"1864-5917","type":"electronic"}],"subject":[],"published":{"date-parts":[[2008,1,10]]}}}