{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,6]],"date-time":"2026-04-06T07:19:41Z","timestamp":1775459981108,"version":"3.50.1"},"reference-count":36,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,6,6]],"date-time":"2022-06-06T00:00:00Z","timestamp":1654473600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,6,6]],"date-time":"2022-06-06T00:00:00Z","timestamp":1654473600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,6,6]]},"DOI":"10.1109\/aiiot54504.2022.9817213","type":"proceedings-article","created":{"date-parts":[[2022,7,13]],"date-time":"2022-07-13T19:41:02Z","timestamp":1657741262000},"page":"364-371","source":"Crossref","is-referenced-by-count":6,"title":["A Review of Human Immune Inspired Algorithms for Intrusion Detection Systems"],"prefix":"10.1109","author":[{"given":"Chukwuemeka","family":"Duru","sequence":"first","affiliation":[{"name":"Morgan State University,Department of Electrical and Computer Engineering,Baltimore,MD,USA,21251"}]},{"given":"Jumoke","family":"Ladeji-Osias","sequence":"additional","affiliation":[{"name":"Morgan State University,Department of Electrical and Computer Engineering,Baltimore,MD,USA,21251"}]},{"given":"Ketchiozo","family":"Wandji","sequence":"additional","affiliation":[{"name":"Morgan State University,Department of Electrical and Computer Engineering,Baltimore,MD,USA,21251"}]},{"given":"Toutsop","family":"Otily","sequence":"additional","affiliation":[{"name":"Morgan State University,Department of Electrical and Computer Engineering,Baltimore,MD,USA,21251"}]},{"given":"Rachida","family":"Kone","sequence":"additional","affiliation":[{"name":"Morgan State University,Department of Electrical and Computer Engineering,Baltimore,MD,USA,21251"}]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-7908-1846-8_12"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1996.502674"},{"key":"ref31","article-title":"Negative Selection: How to Generate Detectors","author":"ayara","year":"2002","journal-title":"Canterbury Kent Uk"},{"key":"ref30","first-page":"196","article-title":"Review of embedded systems security","volume":"17","author":"duru","year":"2020","journal-title":"Journal of Engineering and Applied Sciences"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ICSIoT55070.2021.00011"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.3906\/elk-1603-73"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29350-4_28"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-06369-9_4"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SSCI.2018.8628868"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2008.02.011"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICONIP.2002.1203069"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1201\/9781420065466"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/RISP.1994.296580"},{"key":"ref16","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/7263.001.0001","author":"cziko","year":"1995","journal-title":"Without Miracles Universal Selection Theory and the Second Darwinian Revolution"},{"key":"ref17","article-title":"Recent advances in clonal selection algorithms and applications","author":"luo","year":"2018","journal-title":"IEEE Symposium Series on Computational Intelligence (SSCI)"},{"key":"ref18","first-page":"117","volume":"36","author":"ulutas","year":"2011","journal-title":"A review of clonal selection algorithm and its applications"},{"key":"ref19","article-title":"Clonal selection algorithms","author":"brownlee","year":"2007","journal-title":"CIS Technical Report"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45192-1_15"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/WINCOM.2018.8629728"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3015399"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/AIPR50011.2020.9425304"},{"key":"ref6","article-title":"B-Cells vs T-Cells: Learn the Difference &#38; Types of T-Cells | CTCA","year":"2022","journal-title":"Cancer Treatment Centers of America"},{"key":"ref29","author":"kim","year":"2002","journal-title":"Integrating artificial immune algorithms for intrusion detection"},{"key":"ref5","article-title":"Genome.gov","author":"brody","year":"2021","journal-title":"National Human Genome Res Inst"},{"key":"ref8","author":"gunay","year":"2019","journal-title":"Diagnosis of Lung Cancer Using Artificial Immune System"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICACAT.2018.8933710"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1186\/s42400-019-0038-7"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICIEAM48468.2020.9112054"},{"key":"ref1","article-title":"Exploring The Security Issues in Home-Based loT Devices Through Denial of Service Attacks","author":"toutsop","year":"2021","journal-title":"IEEE SmartWorld Ubiquitous Intelligence & Computing Advanced & Trusted Computing Scalable Computing & Communications Internet of People and Smart City Innovation Atlanta USA"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2002.1011539"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2019.8789938"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/HPCC\/SmartCity\/DSS.2018.00254"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/11823940_31"},{"key":"ref23","author":"greensmith","year":"2007","journal-title":"Dendritic Cell Algorithm"},{"key":"ref26","article-title":"Modeling of Wireless Sensor Networks Jamming Attack Strategies","volume":"67","author":"duru","year":"2020","journal-title":"American scientific research journal for engineering technology and sciences"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85072-4_13"}],"event":{"name":"2022 IEEE World AI IoT Congress (AIIoT)","location":"Seattle, WA, USA","start":{"date-parts":[[2022,6,6]]},"end":{"date-parts":[[2022,6,9]]}},"container-title":["2022 IEEE World AI IoT Congress (AIIoT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9817098\/9817144\/09817213.pdf?arnumber=9817213","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,29]],"date-time":"2024-09-29T02:35:52Z","timestamp":1727577352000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9817213\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,6]]},"references-count":36,"URL":"https:\/\/doi.org\/10.1109\/aiiot54504.2022.9817213","relation":{},"subject":[],"published":{"date-parts":[[2022,6,6]]}}}