{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,5,25]],"date-time":"2023-05-25T01:40:46Z","timestamp":1684978846868},"reference-count":39,"publisher":"Elsevier BV","issue":"1","license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Information Fusion"],"published-print":{"date-parts":[[2010,1]]},"DOI":"10.1016\/j.inffus.2009.04.008","type":"journal-article","created":{"date-parts":[[2009,5,5]],"date-time":"2009-05-05T09:31:38Z","timestamp":1241515898000},"page":"35-44","source":"Crossref","is-referenced-by-count":25,"title":["Information fusion in the immune system"],"prefix":"10.1016","volume":"11","author":[{"given":"Jamie","family":"Twycross","sequence":"first","affiliation":[]},{"given":"Uwe","family":"Aickelin","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.inffus.2009.04.008_bib1","unstructured":"U. Aickelin, J. Greensmith, J. Twycross, Immune system approaches to intrusion detection \u2013 a review, in: Proceedings of the Third International Conference on Artificial Immune Systems, Catania, Italy, LNCS, vol. 3239, 2004, pp. 316\u2013329."},{"key":"10.1016\/j.inffus.2009.04.008_bib2","unstructured":"B. Alberts, A. Johnson, J. Lewis, M. Raff, K. Roberts, P. Walter, Molecular Biology of the Cell, fourth ed., Garland Science, 2002, ."},{"key":"10.1016\/j.inffus.2009.04.008_bib3","doi-asserted-by":"crossref","unstructured":"J. Allen, A. Christie, W. Fithen, J. McHugh, J. Pickel, E. Stoner, State of the practice of intrusion detection technologies, Technical Report CMU\/SEI-99-TR-028, Software Engineering Institute, Carnegie Mellon University, January 2000.","DOI":"10.21236\/ADA375846"},{"issue":"6","key":"10.1016\/j.inffus.2009.04.008_bib4","doi-asserted-by":"crossref","first-page":"439","DOI":"10.1038\/nri823","article-title":"Activation rules: the two-signal theories of immune activation","volume":"2","author":"Baxter","year":"2002","journal-title":"Nature Reviews in Immunology"},{"issue":"4","key":"10.1016\/j.inffus.2009.04.008_bib5","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1109\/MCI.2006.329705","article-title":"Advances in artificial immune systems","volume":"1","author":"Dasgupta","year":"2006","journal-title":"IEEE Computational Intelligence Magazine"},{"key":"10.1016\/j.inffus.2009.04.008_bib6","series-title":"Artificial Immune Systems and Their Applications","author":"Dasgupta","year":"1999"},{"key":"10.1016\/j.inffus.2009.04.008_bib7","unstructured":"D. Dasgupta, R. Azeem, Artificial Immune Systems: A Bibliography, 2006, Published online at ."},{"key":"10.1016\/j.inffus.2009.04.008_bib8","series-title":"Artificial Immune Systems: A New Computational Intelligence Approach","author":"de Castro","year":"2002"},{"issue":"7\u20138","key":"10.1016\/j.inffus.2009.04.008_bib9","doi-asserted-by":"crossref","first-page":"361","DOI":"10.1007\/BF02994844","article-title":"A revised taxonomy for intrusion detection systems","volume":"55","author":"Debar","year":"2000","journal-title":"Annales des Telecommunications"},{"key":"10.1016\/j.inffus.2009.04.008_bib10","unstructured":"H.F. Durrant-Whyte, M. Stevens, E. Nettleton, Data fusion in decentralised sensing networks, in: Proceedings of the Fourth International Conference on Information Fusion, Montreal, Canada, 2001, pp. 302\u2013307."},{"issue":"8","key":"10.1016\/j.inffus.2009.04.008_bib11","doi-asserted-by":"crossref","first-page":"1039","DOI":"10.1084\/jem.20041457","article-title":"Central tolerance to tissue-specific antigens mediated by direct and indirect antigen presentation","volume":"200","author":"Gallegos","year":"2004","journal-title":"Journal of Experimental Medicine"},{"key":"10.1016\/j.inffus.2009.04.008_bib12","doi-asserted-by":"crossref","unstructured":"D. Gao, M.K. Reiter, D. Song, Gray-box extraction of execution graphs for anomaly detection, in: Proceedings of the ACM Conference on Computer and Communications Security, Washington, DC, 2004, pp. 318\u2013329.","DOI":"10.1145\/1030083.1030126"},{"key":"10.1016\/j.inffus.2009.04.008_bib13","unstructured":"V. Gorodetsky, O. Karsaev, I. Kotenko, V. Samoilov, Multi-agent information fusion: methodology, architecture and software tools for learning of object and situation assessment, in: Proceedings of the Ninth International Conference on Information Fusion, Florence, Italy, 2006, pp. 346\u2013353."},{"key":"10.1016\/j.inffus.2009.04.008_bib14","unstructured":"J. Greensmith, U. Aickelin, J. Twycross, Articulation and clarification of the dendritic cell algorithm, in: Proceedings of the Fifth International Conference on Artificial Immune Systems, Oeiras, Portugal, LNCS, vol. 4163, 2006, pp. 404\u2013417."},{"key":"10.1016\/j.inffus.2009.04.008_bib15","doi-asserted-by":"crossref","unstructured":"J. Greensmith, J. Twycross, U. Aickelin, Dendritic cells for anomaly detection, in: Proceedings of the IEEE World Congress on Computational Intelligence, Vancouver, Canada, 2006, pp. 664\u2013671.","DOI":"10.2139\/ssrn.2831377"},{"key":"10.1016\/j.inffus.2009.04.008_bib16","series-title":"Handbook of Multisensor Data Fusion","year":"2001"},{"key":"10.1016\/j.inffus.2009.04.008_bib17","unstructured":"E. Hart, J. Timmis, Application areas of AIS: the past, the present and the future, in: Proceedings of the Fourth International Conference on Artificial Immune Systems, Banff, Canada, LNCS, vol. 3627, 2005, pp. 483\u2013497."},{"issue":"2","key":"10.1016\/j.inffus.2009.04.008_bib18","doi-asserted-by":"crossref","first-page":"539","DOI":"10.4049\/jimmunol.161.2.539","article-title":"The road less traveled: the role of innate immunity in the adaptive immune response \u2013 presidential address to the American Association of Immunologists","volume":"161","author":"Janeway","year":"1998","journal-title":"Journal of Immunology"},{"issue":"1","key":"10.1016\/j.inffus.2009.04.008_bib19","doi-asserted-by":"crossref","first-page":"197","DOI":"10.1146\/annurev.immunol.20.083001.084359","article-title":"Innate immune recognition","volume":"20","author":"Janeway","year":"2002","journal-title":"Annual Review of Immunology"},{"key":"10.1016\/j.inffus.2009.04.008_bib20","unstructured":"C.A. Janeway, P. Travers, M. Walport, M. Shlomchik, Immunobiology: The Immune System in Health and Disease, sixth ed., Garland Publishing, 2005, ."},{"issue":"4","key":"10.1016\/j.inffus.2009.04.008_bib21","first-page":"27","article-title":"Intrusion detection: a brief history and overview","volume":"35","author":"Kemmerer","year":"2002","journal-title":"Security and Privacy, Supplement to IEEE Computer Magazine"},{"issue":"9","key":"10.1016\/j.inffus.2009.04.008_bib22","doi-asserted-by":"crossref","first-page":"688","DOI":"10.1038\/nri1436","article-title":"Self-representation in the thymus: an extended view","volume":"4","author":"Kyewski","year":"2004","journal-title":"Nature Reviews in Immunology"},{"key":"10.1016\/j.inffus.2009.04.008_bib23","unstructured":"libtissue sourcecode and datasets, 2007, ."},{"issue":"1","key":"10.1016\/j.inffus.2009.04.008_bib24","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1109\/JPROC.1997.554211","article-title":"Distributed fusion architectures and algorithms for target tracking","volume":"85","author":"Liggins","year":"1997","journal-title":"Proceedings of the IEEE"},{"key":"10.1016\/j.inffus.2009.04.008_bib25","unstructured":"H. Lodish, A. Berk, P. Matsudaira, C.A. Kaiser, M. Krieger, M.P. Scott, L. Zipursky, J. Darnell, Molecular Cell Biology, fourth ed., W.H. Freeman and Co., 1999, ."},{"key":"10.1016\/j.inffus.2009.04.008_bib26","unstructured":"R.C. Luo, A.M.D. Shr, C.Y. Hu, Multiagent based multisensor resource management, in: Proceedings of the IEEE International Conference on Intelligent Robotics and Systems, Victoria, Canada, vol. 2, 1998, pp. 1034\u20131039."},{"issue":"3","key":"10.1016\/j.inffus.2009.04.008_bib27","doi-asserted-by":"crossref","first-page":"304","DOI":"10.1016\/j.inffus.2005.01.001","article-title":"Multi-sensor fusion: an evolutionary algorithm approach","volume":"7","author":"Maslov","year":"2006","journal-title":"Information Fusion"},{"issue":"3","key":"10.1016\/j.inffus.2009.04.008_bib28","doi-asserted-by":"crossref","first-page":"185","DOI":"10.1006\/smim.2000.0230","article-title":"How does the immune system distinguish self from nonself?","volume":"12","author":"Medzhitov","year":"2000","journal-title":"Seminars in Immunology"},{"issue":"5","key":"10.1016\/j.inffus.2009.04.008_bib29","doi-asserted-by":"crossref","first-page":"338","DOI":"10.1056\/NEJM200008033430506","article-title":"Innate immunity","volume":"343","author":"Medzhitov","year":"2000","journal-title":"The New England Journal of Medicine"},{"key":"10.1016\/j.inffus.2009.04.008_bib30","unstructured":"Proceedings of the International Conference on Artificial Immune Systems, 2002\u20132007, ."},{"issue":"1","key":"10.1016\/j.inffus.2009.04.008_bib31","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1016\/j.smim.2003.10.004","article-title":"Toll-like receptors and dendritic cells: for whom the bug tolls","volume":"16","author":"Reis e Sousa","year":"2004","journal-title":"Seminars in Immunology"},{"key":"10.1016\/j.inffus.2009.04.008_bib32","series-title":"Design Principles for the Immune System and Other Distributed Autonomous Systems","year":"2001"},{"issue":"1","key":"10.1016\/j.inffus.2009.04.008_bib33","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s11047-006-9029-1","article-title":"Artificial immune systems \u2013 today and tomorrow","volume":"6","author":"Timmis","year":"2007","journal-title":"Natural Computing"},{"key":"10.1016\/j.inffus.2009.04.008_bib34","unstructured":"J. Twycross, Integrated innate and adaptive artificial immune systems applied to process anomaly detection, PhD Thesis, School of Computer Science, University of Nottingham, UK, 2007."},{"key":"10.1016\/j.inffus.2009.04.008_bib35","doi-asserted-by":"crossref","unstructured":"J. Twycross, U. Aickelin, libtissue \u2013 implementing innate immunity, in: Proceedings of the IEEE World Congress on Computational Intelligence, Vancouver, Canada, July 2006, pp. 499\u2013506.","DOI":"10.2139\/ssrn.2831992"},{"key":"10.1016\/j.inffus.2009.04.008_bib36","doi-asserted-by":"crossref","unstructured":"J. Twycross, U. Aickelin, An immune-inspired approach to anomaly detection, in: J.N.D. Gupta, S.K. Sharma (Eds.), Handbook of Research on Information Assurance and Security, IGI Global, New York, 2009, pp. 109\u2013121 (Chapter 10).","DOI":"10.4018\/978-1-59904-855-0.ch010"},{"key":"10.1016\/j.inffus.2009.04.008_bib37","unstructured":"A. Watkins, J. Timmis, Exploiting parallelism inherent in AIRS, an artificial immune classifier, in: Proceedings of the Third International Conference on Artificial Immune Systems, Catania, Italy, LNCS, vol. 3239, 2004, pp. 427\u2013438."},{"issue":"2","key":"10.1016\/j.inffus.2009.04.008_bib38","doi-asserted-by":"crossref","first-page":"163","DOI":"10.1016\/S1566-2535(02)00055-6","article-title":"Multi-sensor management for information fusion: issues and approaches","volume":"3","author":"Xiong","year":"2002","journal-title":"Information Fusion"},{"key":"10.1016\/j.inffus.2009.04.008_bib39","unstructured":"H. Xu, W. Du, S.J. Chapin, Context sensitive anomaly monitoring of process control flow to detect mimicry attacks and impossible paths, in: Proceedings of the Seventh International Symposium on Recent Advances in Intrusion Detection, Sophia Antipolis, France, LNCS, vol. 3224, 2004, pp. 21\u201338."}],"container-title":["Information Fusion"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1566253509000402?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1566253509000402?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2023,5,25]],"date-time":"2023-05-25T01:15:53Z","timestamp":1684977353000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1566253509000402"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,1]]},"references-count":39,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2010,1]]}},"alternative-id":["S1566253509000402"],"URL":"http:\/\/dx.doi.org\/10.1016\/j.inffus.2009.04.008","relation":{},"ISSN":["1566-2535"],"issn-type":[{"value":"1566-2535","type":"print"}],"subject":["Hardware and Architecture","Information Systems","Signal Processing","Software"],"published":{"date-parts":[[2010,1]]}}}