{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:07:13Z","timestamp":1767337633619,"version":"3.28.0"},"reference-count":28,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,10]]},"DOI":"10.1109\/uemcon.2017.8249054","type":"proceedings-article","created":{"date-parts":[[2018,2,20]],"date-time":"2018-02-20T00:14:25Z","timestamp":1519085665000},"page":"294-299","source":"Crossref","is-referenced-by-count":19,"title":["Denial of service attack detection using dendritic cell algorithm"],"prefix":"10.1109","author":[{"given":"Obinna","family":"Igbe","sequence":"first","affiliation":[]},{"given":"Oluwaseyi","family":"Ajayi","sequence":"additional","affiliation":[]},{"given":"Tarek","family":"Saadawi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"120","article-title":"A data mining framework for building intrusion detection models","author":"lee","year":"1999","journal-title":"Security and Privacy 1999 Proceedings of the 1999 IEEE Symposium on"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2008.08.003"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICCEEE.2013.6633939"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1162\/106365600568257"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.2832054"},{"key":"ref15","first-page":"84","article-title":"The dendritic cell algorithm for intrusion detection","author":"gu","year":"2011","journal-title":"Biologically Inspired Networking and Sensing Algorithms and Architectures Algorithms and Architectures"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2015.7366308"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2012.06.056"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-43826-8_15"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-012-0173-3"},{"journal-title":"NSLKDD-Dataset","year":"0","key":"ref28"},{"key":"ref4","first-page":"75","article-title":"Principles of a immune system","author":"somayaji","year":"1998","journal-title":"Proceedings of the 1997 workshop on New security paradigms"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85072-4_26"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/CHASE.2016.36"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICSMC.2000.886455"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/CIS.2009.215"},{"journal-title":"RivalHost DDoS attack types The 12 types of DDoS attacks used by hackers","year":"0","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1216370.1216373"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2005.06.003"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1080\/19393555.2015.1125974"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"447","DOI":"10.1109\/TPDS.2013.146","article-title":"A system for denial-of-service attack detection based on multivariate correlation analysis","volume":"25","author":"tan","year":"2014","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-73922-7_9"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2008.4631034"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/CCIS.2012.6664254"},{"journal-title":"On the Appropriateness of Negative Selection for Anomaly Detection and Network Intrusion Detection","year":"2006","author":"stibor","key":"ref24"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/CSCloud.2017.12"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1007\/11536444_12","article-title":"Introducing dendritic cells as a novel immune-inspired algorithm for anomaly detection","author":"greensmith","year":"2005","journal-title":"International Conference on Artificial Immune Systems"},{"journal-title":"The Dendritic Cell Algorithm","year":"2007","author":"greensmith","key":"ref25"}],"event":{"name":"2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON)","start":{"date-parts":[[2017,10,19]]},"location":"New York, NY","end":{"date-parts":[[2017,10,21]]}},"container-title":["2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8234833\/8248967\/08249054.pdf?arnumber=8249054","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,23]],"date-time":"2020-08-23T22:14:25Z","timestamp":1598220865000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8249054\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/uemcon.2017.8249054","relation":{},"subject":[],"published":{"date-parts":[[2017,10]]}}}