{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,26]],"date-time":"2025-02-26T05:34:32Z","timestamp":1740548072691,"version":"3.38.0"},"publisher-location":"New York, NY","reference-count":15,"publisher":"Springer New York","isbn-type":[{"type":"print","value":"9781441959126"},{"type":"electronic","value":"9781441959133"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-1-4419-5913-3_33","type":"book-chapter","created":{"date-parts":[[2010,9,23]],"date-time":"2010-09-23T17:09:54Z","timestamp":1285261794000},"page":"291-298","source":"Crossref","is-referenced-by-count":3,"title":["Temporal Anomaly Detection: An Artificial Immune Approach Based on T Cell Activation, Clonal Size Regulation and Homeostasis"],"prefix":"10.1007","author":[{"given":"M\u00e1rio J.","family":"Antunes","sequence":"first","affiliation":[]},{"given":"Manuel E.","family":"Correia","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2010,8,9]]},"reference":[{"key":"33_CR1_33","doi-asserted-by":"crossref","unstructured":"Antunes M, Correia E (2008) TAT-NIDS: an immune-based anomaly detection architecture for network intrusion detection, Proceedings of IWPACBB\u201908 \u2013 Advances in Soft Computing (Springer), pp 60\u201367","DOI":"10.1007\/978-3-540-85861-4_8"},{"key":"33_CR2_33","doi-asserted-by":"crossref","unstructured":"Antunes M, Correia E, Carneiro J (2009) Towards an immune-inspired temporal anomaly detection algorithm based on tunable activation thresholds, Proceedings of International Conference of Bioinspired systems and signal processing (BIOSIGNALS), pp 357\u2013362","DOI":"10.5220\/0001553303570362"},{"key":"33_CR3_33","doi-asserted-by":"crossref","unstructured":"Antunes M, Correia E (2009) An Artificial Immune System for Temporal Anomaly Detection Using Cell Activation Thresholds and Clonal Size Regulation with Homeostasis, Proceedings of International Joint Conferences on Bioinformatics, Systems Biology and Intelligent Computing (IJCBS), pp 323\u2013326","DOI":"10.1109\/IJCBS.2009.59"},{"key":"33_CR4_33","doi-asserted-by":"crossref","unstructured":"Burmester G, Pezzuto A (2003) Color Atlas of Immunology. Thieme Medical Publishers, George Thieme Verlag","DOI":"10.1055\/b-005-148845"},{"key":"33_CR5_33","doi-asserted-by":"crossref","DOI":"10.5962\/bhl.title.8281","volume-title":"The Clonal Selection Theory of Acquired Immunity","author":"F Burnet","year":"1959","unstructured":"Burnet F (1959) The Clonal Selection Theory of Acquired Immunity, Vanderbilt University Press Nashville, Tennesse"},{"issue":"1","key":"33_CR6_33","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1016\/j.cam.2004.10.025","volume":"184","author":"J Carneiro","year":"2005","unstructured":"Carneiro J, Paix\u00e3o T et al (2005) Immunological self-tolerance: Lessons from mathematical modeling, Journal of Computational and Applied Mathematics 184(1):77\u2013100","journal-title":"Journal of Computational and Applied Mathematics"},{"key":"33_CR7_33","volume-title":"Artificial Immune Systems: A New Computational Intelligence Approach","author":"L Castro","year":"2002","unstructured":"Castro L, Timmis J (2002) Artificial Immune Systems: A New Computational Intelligence Approach. Springer, New York"},{"issue":"25","key":"33_CR8_33","doi-asserted-by":"publisher","first-page":"14747","DOI":"10.1073\/pnas.93.25.14747","volume":"93","author":"Z Grossman","year":"1996","unstructured":"Grossman Z and Singer A (1996), Tuning of activation thresholds explains flexibility in the selection and development of Tcells in the thymus, Proceedings of the National Academy of Sciences 93(25):14747\u201314752","journal-title":"Proceedings of the National Academy of Sciences"},{"key":"33_CR9_33","unstructured":"Kim J, Bentley P (2001) An evaluation of negative selection in an artificial immune system for network intrusion detection, Proceedings of Genetic and Evolutionary Computation Conference (GECCO), 1330\u20131337"},{"issue":"4","key":"33_CR10_33","doi-asserted-by":"publisher","first-page":"413","DOI":"10.1007\/s11047-006-9026-4","volume":"6","author":"J Kim","year":"2007","unstructured":"Kim J, Bentley P, Aickelin U, Greensmith J, Tedesco G, and Twycross J (2007) Immune system approaches to intrusion detection \u2013 a review, Natural Computing 6(4):413\u2013466","journal-title":"Natural Computing"},{"issue":"5566","key":"33_CR11_33","first-page":"301","volume":"296","author":"P Matzinger","year":"2002","unstructured":"Matzinger P (2002) The danger model: a renewed sense of self, Science\u2019s STKE 296(5566):301\u2013305","journal-title":"Science\u2019s STKE"},{"key":"33_CR12_33","unstructured":"Pedroso J (2007) Simple Metaheuristics Using the Simplex Algorithm for Non-linear Programming, Engineering Stochastic Local Search Algorithms. Designing, Implementing and Analyzing Effective Heuristics \u2013 LNCS (Springer), 4638:217\u2013221"},{"key":"33_CR13_33","first-page":"995","volume":"2","author":"T Stibor","year":"2005","unstructured":"Stibor T, Timmis J and Eckert C (2005) On the appropriateness of negative selection defined over hamming shape-space as a network intrusion detection system, Proceedings of IEEE congress on Evolutionary Computation (CEC) 2:995\u20131002","journal-title":"Proceedings of IEEE congress on Evolutionary Computation (CEC)"},{"key":"33_CR14_33","doi-asserted-by":"crossref","first-page":"1725","DOI":"10.4049\/jimmunol.165.4.1725","volume":"165","author":"R Vance","year":"2000","unstructured":"Vance R (2000) Cutting edge commentary: A Copernican revolution? doubts about the danger theory, The Journal of Immunology 165:1725\u20131728","journal-title":"The Journal of Immunology"},{"issue":"3","key":"33_CR15_33","doi-asserted-by":"publisher","first-page":"397","DOI":"10.1016\/j.jtbi.2004.02.002","volume":"228","author":"H Berg van den","year":"2004","unstructured":"van den Berg H and Rand D (2004) Dynamics of T cell activation threshold tuning, Journal of Theoretical Biology 228(3):397\u2013416","journal-title":"Journal of Theoretical Biology"}],"container-title":["Advances in Experimental Medicine and Biology","Advances in Computational Biology"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-1-4419-5913-3_33","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,26]],"date-time":"2025-02-26T00:53:08Z","timestamp":1740531188000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-1-4419-5913-3_33"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9781441959126","9781441959133"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-1-4419-5913-3_33","relation":{},"ISSN":["0065-2598"],"issn-type":[{"type":"print","value":"0065-2598"}],"subject":[],"published":{"date-parts":[[2010]]}}}