{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T06:49:25Z","timestamp":1760597365725,"version":"3.28.0"},"reference-count":27,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,6]]},"DOI":"10.1109\/cec.2008.4631193","type":"proceedings-article","created":{"date-parts":[[2008,9,26]],"date-time":"2008-09-26T11:17:53Z","timestamp":1222427873000},"page":"2933-2939","source":"Crossref","is-referenced-by-count":1,"title":["On convergence of Evolutionary Negative Selection Algorithms for anomaly detection"],"prefix":"10.1109","author":[{"family":"Wenjian Luo","sequence":"first","affiliation":[]},{"family":"Peng Guo","sequence":"additional","affiliation":[]},{"family":"Xufa Wang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","first-page":"175","article-title":"a model of gene library evolution in the dynamic clonal selection algorithm","author":"kim","year":"2002","journal-title":"Proceedings of the First International Conference on Artificial Immune Systems (ICARIS-2002)"},{"key":"17","article-title":"an immunogenetic approach to intrusion detection","author":"gonzalez","year":"2002","journal-title":"Proceedings of the Genetic and Evolutionary Computation Conference (GECCO2002)"},{"key":"18","first-page":"1015","article-title":"towards an artificial immune system for network intrusion detection: an investigation of dynamic clonal selection","author":"kim","year":"2002","journal-title":"Proceedings of the Congress on Evolutionary Computation (CEC-2002)"},{"year":"0","key":"15"},{"key":"16","first-page":"535","article-title":"immune optimization system based on immune recognition","volume":"2","author":"cao","year":"2001","journal-title":"Proceedings of 8th International Conference on Neural Information Processing"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1996.502674"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.1996.503687"},{"key":"11","first-page":"3","article-title":"an interpretative introduction to the immune system. design principles for the immune system and other distributed autonomous systems, oxford university press, i","author":"hofmeyr","year":"2000","journal-title":"Cohen and L"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2002.1011539"},{"journal-title":"Mathematical foundation of genetic algorithms","year":"2000","author":"zhang","key":"21"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/72.265964"},{"journal-title":"Genetic Algorithms and Their Applications","year":"1996","author":"chen","key":"22"},{"article-title":"further efficient algorithms for generating antibody strings. dept. comput. sci., univ. new mexico","year":"1995","author":"d'haeseleer","key":"23"},{"year":"0","key":"24"},{"key":"25","first-page":"158","article-title":"experimental analyses of evolutionary negative selection algorithm for function optimization","volume":"27","author":"luo","year":"2006","journal-title":"Journal of Harbin Engineering University"},{"key":"26","first-page":"1987","article-title":"research of mobile robots path planning algorithm based on immune evolutionary negative selection mechanism","volume":"29","author":"zhang","year":"2007","journal-title":"Journal of electronics and information technology"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2007.03.003"},{"journal-title":"Immunocomputing Principles and applications","year":"2003","author":"taraknaov","key":"3"},{"journal-title":"Artificial Immune Systems A New Computational Intelligence Approach","year":"2002","author":"de castro","key":"2"},{"key":"10","first-page":"907","article-title":"research on detector adaptively generating algorithm","volume":"31","author":"luo","year":"2005","journal-title":"ACTA Automatica Sinica"},{"journal-title":"Artificial immune system and their application","year":"1998","author":"dasgupta","key":"1"},{"journal-title":"Integrating artificial immune algorithms for intrusion detection","year":"2002","author":"kim","key":"7"},{"key":"6","first-page":"149","article-title":"negative selection and niching by an artificial immune system for network intrusion detection","author":"kim","year":"1999","journal-title":"Proceedings of Genetic and Evolutionary Computation Conference (GECCO'99)"},{"key":"5","first-page":"130","article-title":"a biologically inspired immune system for computers","author":"kephart","year":"1994","journal-title":"Proceedings of Artificial life"},{"year":"0","key":"4"},{"key":"9","article-title":"evolutionary negative selection algorithms for anomaly detection","author":"luo","year":"2005","journal-title":"Proceedings of the 8th Joint Conference on Information Sciences (JCIS'2005)"},{"year":"0","key":"8"}],"event":{"name":"2008 IEEE Congress on Evolutionary Computation (CEC)","start":{"date-parts":[[2008,6,1]]},"location":"Hong Kong, China","end":{"date-parts":[[2008,6,6]]}},"container-title":["2008 IEEE Congress on Evolutionary Computation (IEEE World Congress on Computational Intelligence)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4625778\/4630767\/04631193.pdf?arnumber=4631193","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,17]],"date-time":"2017-03-17T11:14:36Z","timestamp":1489749276000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4631193\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,6]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/cec.2008.4631193","relation":{},"subject":[],"published":{"date-parts":[[2008,6]]}}}