{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T03:07:28Z","timestamp":1761620848610},"reference-count":30,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/fuzz.2003.1206605","type":"proceedings-article","created":{"date-parts":[[2004,2,3]],"date-time":"2004-02-03T14:24:01Z","timestamp":1075818241000},"page":"1219-1224","source":"Crossref","is-referenced-by-count":45,"title":["An immuno-fuzzy approach to anomaly detection"],"prefix":"10.1109","volume":"2","author":[{"given":"J.","family":"Gomez","sequence":"first","affiliation":[]},{"given":"F.","family":"Gonzalez","sequence":"additional","affiliation":[]},{"given":"D.","family":"Dasgupta","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref30","article-title":"Using artif cial anomalies to detect unknown and known network intrusions","author":"fan","year":"2001","journal-title":"Proceedings of the First IEEE International Conference on Data Mining"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-59901-9"},{"key":"ref11","first-page":"130","article-title":"A biologically inspired immune system for computers","author":"kephart","year":"1994","journal-title":"Proceedings of Artificial life"},{"key":"ref12","first-page":"1330","article-title":"An evaluation of negative selection in an artifi cial immune system for network intrusion detection","author":"kim","year":"2001","journal-title":"Proceedings of the Genetic and Evolutionary Computation Conference (GECCO-2001)"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/RISP.1994.296580"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-59901-9"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-59901-9_14"},{"key":"ref16","article-title":"Tool breakage detection in milling operations using a negative-selection algorithm","author":"dasgupta","year":"1995","journal-title":"Technical Report CS95&#x2013;5"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/EURMIC.1999.794771"},{"key":"ref18","first-page":"705","article-title":"Combining negative selection and classifi cation techniques for anomaly detection","author":"gonz\u00e1lez","year":"2002","journal-title":"Proceedings of the Congress on Evolutionary Computation CEC2002"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2002.1007031"},{"year":"1999","key":"ref28","article-title":"Mit lincoln labs. 1999 darpa intrusion detection evaluation"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1987.232894"},{"key":"ref27","first-page":"166","article-title":"An adaptive resonance architecture to defi ne normality and detect novelties in time series and databases","author":"caudell","year":"1993"},{"key":"ref3","article-title":"Fault detection by mining association rules from housekeeping data","author":"yostnkiyo","year":"2001","journal-title":"proceedings of international symposium on artificial intelligence robotics and automation in space (i-sairas 2001)"},{"key":"ref6","article-title":"Data mining approaches for intrusion detection","author":"lee","year":"1998","journal-title":"Proceedings of the 7th USENIX Security Symposium"},{"key":"ref29","article-title":"Evolving Fuzzy Classifi ers for Intrusion Detection","author":"gomez","year":"2002","journal-title":"Proceedings of the 2002 IEEE Workshop on Information Assurance"},{"journal-title":"Machine learning techniques for the computer security","year":"2000","author":"lane","key":"ref5"},{"key":"ref8","first-page":"1081","article-title":"An imunogenetic technique to detect anomalies in network traffi c","author":"gonzalez","year":"2002","journal-title":"GECCO 2002 Proceedings of the Genetic and Evolutionary Computation Conference"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2002.1011541"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/775047.775128"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1162\/106365600568257"},{"key":"ref1","first-page":"82","article-title":"Novelty detection in time series data using ideas from immunology","author":"dasgupta","year":"1996","journal-title":"Proceedings of The International Conference on Intelligent Systems"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/72.159066"},{"key":"ref22","first-page":"90","article-title":"Experiments with evolving fuzzy clusters","author":"fogel","year":"1993","journal-title":"Proceedings of the Second Annual Conference on Evolutionary Programming"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TFUZZ.1993.390282"},{"key":"ref24","first-page":"27","article-title":"Crowding and preselection revisited","author":"mahfoud","year":"1992","journal-title":"Parallel Problem Solving from Nature 2"},{"key":"ref23","first-page":"521","article-title":"Discovering patterns in spatial data using evolutionary programming","author":"ghozeil","year":"1996","journal-title":"Genetic Programming 1996 Proceedings of the First Annual Conference"},{"key":"ref26","first-page":"445","article-title":"The case against accuracy estimation for comparing induction algorithms","author":"provost","year":"1998","journal-title":"Proceedings of 15th International Conference on Machine Learning"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1162\/evco.1993.1.2.101"}],"event":{"name":"12th International Fuzzy Systems Conference","acronym":"FUZZY-03","location":"St Louis, MO, USA"},"container-title":["The 12th IEEE International Conference on Fuzzy Systems, 2003. FUZZ '03."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8573\/27148\/01206605.pdf?arnumber=1206605","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,13]],"date-time":"2017-03-13T12:56:11Z","timestamp":1489409771000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1206605\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/fuzz.2003.1206605","relation":{},"subject":[]}}