{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,28]],"date-time":"2025-08-28T18:40:27Z","timestamp":1756406427706,"version":"3.44.0"},"reference-count":23,"publisher":"IEEE","license":[{"start":{"date-parts":[[2010,9,1]],"date-time":"2010-09-01T00:00:00Z","timestamp":1283299200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2010,9,1]],"date-time":"2010-09-01T00:00:00Z","timestamp":1283299200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,9]]},"DOI":"10.1109\/bicta.2010.5645253","type":"proceedings-article","created":{"date-parts":[[2010,12,9]],"date-time":"2010-12-09T10:33:18Z","timestamp":1291890798000},"page":"1669-1676","source":"Crossref","is-referenced-by-count":2,"title":["On the use of innate and adaptive parts of artificial immune systems for online fraud detection"],"prefix":"10.1109","author":[{"given":"R.","family":"Huang","sequence":"first","affiliation":[{"name":"Department of Computer Science, Liverpool Hope University, UK"}]},{"given":"H.","family":"Tawfik","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Liverpool Hope University, UK"}]},{"given":"A.K.","family":"Nagar","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Liverpool Hope University, UK"}]}],"member":"263","reference":[{"key":"19","first-page":"132","article-title":"Information immune systems","author":"chao","year":"2002","journal-title":"Proc 3rd Int Conf Artif Immune Syst"},{"journal-title":"Classification and Regression Trees","year":"1984","author":"breiman","key":"22"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2003.1299566"},{"journal-title":"Basic Practice of Statistics","year":"2006","author":"moore","key":"23"},{"key":"18","doi-asserted-by":"crossref","first-page":"404","DOI":"10.1007\/11536444_31","article-title":"Immunising automated teller machines","author":"ayara","year":"2005","journal-title":"Proceedings of the 4th International Conference on Artificial Immune Systems"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-59904-855-0.ch010"},{"journal-title":"Integrated Innate and Adaptive Artificial Immune Systems applied to Process Anomaly Detection","year":"2007","author":"twycross","key":"16"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2006.02.016"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1108\/02686900210424321"},{"key":"11","first-page":"1208","article-title":"Tree based behaviour monitoring for adaptive fraud detection","author":"xu","year":"2006","journal-title":"Proceeding of International Conference on Pattern Recognition"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/ICDEW.2006.157"},{"key":"21","first-page":"279","article-title":"Conserved self pattern recognition algorithm","author":"yu","year":"2008","journal-title":"ICARIS"},{"key":"3","first-page":"36","article-title":"The clonal selection algorithm with engineering applications","author":"de castro","year":"2000","journal-title":"Proc GECCO Workshop on Artif Immune Syst Their Appl"},{"key":"20","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-36159-6_23","article-title":"A synthetic fraud data generation methodology","author":"lundin","year":"2002","journal-title":"Proceedings of the Fourth International Conference on Information and Communications Security (ICICS 2002)"},{"key":"2","first-page":"373","article-title":"Towards a network theory of the immune system","volume":"125","author":"jerne","year":"1974","journal-title":"Annals of Immunology"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/RISP.1994.296580"},{"key":"10","first-page":"3630","article-title":"Neural data mining for credit card fraud detection","author":"guo","year":"2008","journal-title":"Proceeding of International Conference on Machine Learning and Cybernetics"},{"key":"7","first-page":"1339","article-title":"A subjective and objective integrated method for fraud detection in financial system","author":"liu","year":"2009","journal-title":"Proceedings of Machine Learning and Cybernetics"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1126\/science.1071059"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1103\/RevModPhys.69.1219"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2006.1688374"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/FUZZY.2006.1681708"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/ICDIM.2007.4444216"}],"event":{"name":"2010 IEEE Fifth International Conference on Bio-Inspired Computing: Theories and Applications (BIC-TA)","start":{"date-parts":[[2010,9,23]]},"location":"Changsha, China","end":{"date-parts":[[2010,9,26]]}},"container-title":["2010 IEEE Fifth International Conference on Bio-Inspired Computing: Theories and Applications (BIC-TA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5629467\/5645057\/05645253.pdf?arnumber=5645253","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,28]],"date-time":"2025-08-28T18:06:42Z","timestamp":1756404402000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/5645253\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,9]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/bicta.2010.5645253","relation":{},"subject":[],"published":{"date-parts":[[2010,9]]}}}