{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,19]],"date-time":"2026-01-19T12:26:29Z","timestamp":1768825589572,"version":"3.49.0"},"reference-count":19,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2019,12,10]],"date-time":"2019-12-10T00:00:00Z","timestamp":1575936000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,12,10]],"date-time":"2019-12-10T00:00:00Z","timestamp":1575936000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Evolving Systems"],"published-print":{"date-parts":[[2021,9]]},"DOI":"10.1007\/s12530-019-09317-1","type":"journal-article","created":{"date-parts":[[2019,12,10]],"date-time":"2019-12-10T05:31:36Z","timestamp":1575955896000},"page":"769-778","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":33,"title":["Anomaly process detection using negative selection algorithm and classification techniques"],"prefix":"10.1007","volume":"12","author":[{"given":"Soodeh","family":"Hosseini","sequence":"first","affiliation":[]},{"given":"Hossein","family":"Seilani","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,12,10]]},"reference":[{"key":"9317_CR1","doi-asserted-by":"crossref","unstructured":"Angelov P (2014) Anomaly detection based on eccentricity analysis. In: 2014 IEEE symposium on evolving and autonomous learning systems (EALS). pp 1\u20138. IEEE, New York","DOI":"10.1109\/EALS.2014.7009497"},{"issue":"3","key":"9317_CR2","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1002\/int.20462","volume":"26","author":"P Angelov","year":"2011","unstructured":"Angelov P, Sadeghi-Tehran P, Ramezani R (2011) An approach to automatic real-time novelty detection, object identification, and tracking in video streams based on recursive density estimation and evolving Takagi-Sugeno fuzzy systems. Int J Intell Syst 26(3):189\u2013205","journal-title":"Int J Intell Syst"},{"issue":"1","key":"9317_CR3","doi-asserted-by":"publisher","first-page":"418","DOI":"10.1016\/j.eswa.2018.12.040","volume":"121","author":"A Brands\u00e6ter","year":"2019","unstructured":"Brands\u00e6ter A, Vanem E, Glad IK (2019) Efficient on-line anomaly detection for ship systems in operation. Expert Syst Appl 121(1):418\u2013437","journal-title":"Expert Syst Appl"},{"key":"9317_CR4","doi-asserted-by":"crossref","unstructured":"Brown J, Anwar M, Dozier G (2016) Intrusion detection using a multiple-detector set artificial immune system. In: 17th international conference on information reuse and integration (IRI). pp 283\u2013286","DOI":"10.1109\/IRI.2016.45"},{"key":"9317_CR5","doi-asserted-by":"crossref","unstructured":"Forrest S, Perelson AS, Allen L, Cherukuri R (1994) Self-Nonself discrimination in a computer. In: Proc. 1994 IEEE symp. on security and privacy, pp 202\u2013212","DOI":"10.1109\/RISP.1994.296580"},{"key":"9317_CR6","doi-asserted-by":"crossref","unstructured":"Hooks D, Yuan X, Roy K, Esterline A, Hernandez J (2018) Applying artificial immune system for intrusion detection. In: 2018 IEEE fourth international conference on big data computing service and applications (big data service), Bamberg, pp 287\u2013292","DOI":"10.1109\/BigDataService.2018.00051"},{"key":"9317_CR7","doi-asserted-by":"crossref","unstructured":"Igbe O, Darwish I, Saadawi T (2016) Distributed network intrusion detection systems: an artificial immune system approach. In: IEEE first international conference in connected health: applications, systems and engineering technologies (CHASE). pp 101\u2013106","DOI":"10.1109\/CHASE.2016.36"},{"key":"9317_CR8","unstructured":"Johny D, Haripriya P, Anju J (2017) Negative selection algorithm: a survey. Int J Sci Eng Technol Res 6"},{"key":"9317_CR9","doi-asserted-by":"crossref","unstructured":"Meena G, Choudhary RR (2017) A review paper on IDS classification using KDD 99 and NSL KDD dataset in WEKA. In: International conference on computer, communications and electronics (Comptelix). pp 553\u2013558","DOI":"10.1109\/COMPTELIX.2017.8004032"},{"issue":"3.24","key":"9317_CR10","first-page":"479","volume":"7","author":"R Panigrahi","year":"2018","unstructured":"Panigrahi R, Borah S (2018) A detailed analysis of CICIDS2017 dataset for designing intrusion detection systems. Int J Eng Technol 7(3.24):479\u2013482","journal-title":"Int J Eng Technol"},{"key":"9317_CR11","first-page":"23","volume":"118","author":"A Pharate","year":"2015","unstructured":"Pharate A, Bhat H, Shilimkar V, Mhetre N (2015) Classification of intrusion detection system. Int J Comput Appl 118:23\u201326","journal-title":"Int J Comput Appl"},{"key":"9317_CR12","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1016\/j.eswa.2016.03.042","volume":"60","author":"P Saurabh","year":"2016","unstructured":"Saurabh P, Verma B (2016) An efficient proactive artificial immune system based anomaly detection and prevention system. Expert Syst Appl 60:311\u2013320","journal-title":"Expert Syst Appl"},{"key":"9317_CR13","first-page":"1","volume":"5","author":"S Sharma","year":"2017","unstructured":"Sharma S, Gupta RK (2017) A model for intrusion detection based on negative selection algorithm and J48 decision tree. Int J Res Appl Sci Eng Technol 5:1\u20137","journal-title":"Int J Res Appl Sci Eng Technol"},{"key":"9317_CR14","doi-asserted-by":"crossref","unstructured":"Tabatabaefar M, Miriestahbanati M, Gr\u00e9goire J-C (2017) Network intrusion detection through artificial immune system. In: 2017 annual IEEE international on systems conference (SysCon). pp. 1\u20136","DOI":"10.1109\/SYSCON.2017.7934751"},{"key":"9317_CR15","first-page":"2545","volume":"4","author":"CJ Ugochukwu","year":"2018","unstructured":"Ugochukwu CJ, Bennett E (2018) An Intrusion detection system using machine learning algorithm. Int J Comput Sci Math Theory 4:2545\u20135699","journal-title":"Int J Comput Sci Math Theory"},{"key":"9317_CR16","doi-asserted-by":"publisher","first-page":"218","DOI":"10.1016\/j.ins.2017.08.062","volume":"420","author":"C Wen","year":"2017","unstructured":"Wen C, Tao L (2017) Parameter analysis of negative selection algorithm. Inf Sci 420:218\u2013234","journal-title":"Inf Sci"},{"key":"9317_CR17","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1109\/TVCG.2018.2864825","volume":"25","author":"K Xu","year":"2019","unstructured":"Xu K, Xia M, Mu X, Wang Y, Cao N (2019) EnsembleLens: ensemble-based visual exploration of anomaly detection algorithms with multidimensional data. IEEE Trans Visual Comput Graphics 25:109\u2013119","journal-title":"IEEE Trans Visual Comput Graphics"},{"key":"9317_CR18","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1515\/phys-2017-0013","volume":"15","author":"T Yang","year":"2017","unstructured":"Yang T, Chen W, Li T (2017) A real negative selection algorithm with evolutionary preference for anomaly detection. Open Phys 15:121\u2013134","journal-title":"Open Phys"},{"key":"9317_CR19","doi-asserted-by":"crossref","unstructured":"Zhang F, Ma Y (2016) Integrated Negative Selection Algorithm and Positive Selection Algorithm for malware detection. In: International conference on informatics and computing (PIC). pp 605\u2013609","DOI":"10.1109\/PIC.2016.7949572"}],"container-title":["Evolving Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12530-019-09317-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12530-019-09317-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12530-019-09317-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,9,13]],"date-time":"2021-09-13T02:16:32Z","timestamp":1631499392000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12530-019-09317-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12,10]]},"references-count":19,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2021,9]]}},"alternative-id":["9317"],"URL":"https:\/\/doi.org\/10.1007\/s12530-019-09317-1","relation":{},"ISSN":["1868-6478","1868-6486"],"issn-type":[{"value":"1868-6478","type":"print"},{"value":"1868-6486","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,12,10]]},"assertion":[{"value":"12 July 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 December 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 December 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}