{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:43:52Z","timestamp":1750308232317,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2005,6,25]],"date-time":"2005-06-25T00:00:00Z","timestamp":1119657600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2005,6,25]]},"DOI":"10.1145\/1068009.1068058","type":"proceedings-article","created":{"date-parts":[[2005,8,3]],"date-time":"2005-08-03T08:31:47Z","timestamp":1123057907000},"page":"297-304","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Discriminating and visualizing anomalies using negative selection and self-organizing maps"],"prefix":"10.1145","author":[{"given":"Fabio A.","family":"Gonz\u00e1lez","sequence":"first","affiliation":[{"name":"Universidad Nacional de Colombia, Bogot\u00e1, Colombia"}]},{"given":"Juan Carlos","family":"Galeano","sequence":"additional","affiliation":[{"name":"Universidad Nacional de Colombia, Bogot\u00e1, Colombia"}]},{"given":"Diego Alexander","family":"Rojas","sequence":"additional","affiliation":[{"name":"Universidad Nacional de Colombia, Bogot\u00e1, Colombia"}]},{"given":"Ang\u00e9lica","family":"Veloza-Suan","sequence":"additional","affiliation":[{"name":"Universidad Nacional de Colombia, Bogot\u00e1, Colombia"}]}],"member":"320","published-online":{"date-parts":[[2005,6,25]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"U.\n      Aickelin P.\n      Bentley S.\n      Cayzer J.\n      Kim and \n      J.\n      McLeod\n    .\n      Danger\n     theory\n  : \n  The link between AIS and IDS?In J\n  . Timmis P. Bentley and E. Hart editors Proceedings of the 2nd International Conference on Artificial Immune Systems volume \n  2787\n   of \n  Lecture Notes in Computer Science pages \n  147\n  --\n  155\n  . \n  Springer-Verlag September \n  2003\n  .  U. Aickelin P. Bentley S. Cayzer J. Kim and J. McLeod.Danger theory: The link between AIS and IDS?In J. Timmis P. Bentley and E. Hart editors Proceedings of the 2nd International Conference on Artificial Immune Systems volume 2787 of Lecture Notes in Computer Science pages 147--155. Springer-Verlag September 2003.","DOI":"10.1007\/978-3-540-45192-1_15"},{"key":"e_1_3_2_1_2_1","volume-title":"Tolouse","author":"Axelsson S.","year":"2004","unstructured":"S. Axelsson . Visualising intrusions : Watching the webserver,.In proceedings of the 19th IFIP International Information Security Conference (SEC2004) , Tolouse , France , Aug 2004 . S. Axelsson.Visualising intrusions: Watching the webserver,.In proceedings of the 19th IFIP International Information Security Conference (SEC2004), Tolouse, France, Aug 2004."},{"key":"e_1_3_2_1_3_1","first-page":"819","volume-title":"preliminary results","author":"Coello Coello C. A.","year":"2002","unstructured":"C. A. Coello Coello and N. Cruz Cort\u00e9s . A parallel implementation of the artificial immune system to handle constraints in genetic algorithms : preliminary results .In D. B. Fogel, M. A. El-Sharkawi, X. Yao, G. Greenwood, H. Iba, P. Marrow, and M. Shackleton, editors, Proceedings of the 2002 Congress on Evolutionary Computation CEC2002, pages 819 -- 824 , USA , 2002. C. A. Coello Coello and N. Cruz Cort\u00e9s.A parallel implementation of the artificial immune system to handle constraints in genetic algorithms: preliminary results.In D. B. Fogel, M. A. El-Sharkawi, X. Yao, G. Greenwood, H. Iba, P. Marrow, and M. Shackleton, editors, Proceedings of the 2002 Congress on Evolutionary Computation CEC2002, pages 819--824, USA, 2002."},{"key":"e_1_3_2_1_4_1","volume-title":"New York","author":"Dasgupta D.","year":"1999","unstructured":"D. Dasgupta . Artificial immune systems and their applications.Springer-Verlag , New York , 1999 . D. Dasgupta.Artificial immune systems and their applications.Springer-Verlag, New York, 1999."},{"key":"e_1_3_2_1_5_1","first-page":"147","volume-title":"a general framework.In Proceedings of the 22nd national information systems security conference (NISSC)","author":"Dasgupta D.","year":"1999","unstructured":"D. Dasgupta .Immunity-based intrusion detection system : a general framework.In Proceedings of the 22nd national information systems security conference (NISSC) , pages 147 -- 160 , Oct. 1999 . D. Dasgupta.Immunity-based intrusion detection system: a general framework.In Proceedings of the 22nd national information systems security conference (NISSC), pages 147--160, Oct. 1999."},{"key":"e_1_3_2_1_7_1","first-page":"82","volume-title":"Proceedings of the 5th International Conference on Intelligent Systems","author":"Dasgupta D.","year":"1996","unstructured":"D. Dasgupta and S. Forrest . Novelty detection in time series data using ideas from immunology.In J. F. C. Harris, editor , Proceedings of the 5th International Conference on Intelligent Systems , pages 82 -- 87 , Cary, NC , June 1996 . ISCA. D. Dasgupta and S. Forrest.Novelty detection in time series data using ideas from immunology.In J. F. C. Harris, editor, Proceedings of the 5th International Conference on Intelligent Systems, pages 82--87, Cary, NC, June 1996. ISCA."},{"key":"e_1_3_2_1_8_1","first-page":"262","volume-title":"An anomaly detection algorithm inspired by the immune system","author":"Dasgupta D.","year":"1999","unstructured":"D. Dasgupta and S. Forrest . An anomaly detection algorithm inspired by the immune system .In D. Dasgupta, editor, Artificial immune systems and their applications,, pages 262 -- 277 . Springer-Verlag , New York, 1999 . D. Dasgupta and S. Forrest.An anomaly detection algorithm inspired by the immune system.In D. Dasgupta, editor, Artificial immune systems and their applications,, pages 262--277. Springer-Verlag, New York, 1999."},{"key":"e_1_3_2_1_9_1","volume-title":"Artificial Immune Systems: A New Computational Approach","author":"de Castro L. N.","year":"2002","unstructured":"L. N. de Castro and J. Timmis . Artificial Immune Systems: A New Computational Approach . Springer-Verlag , London, UK , 2002 . L. N. de Castro and J. Timmis.Artificial Immune Systems: A New Computational Approach.Springer-Verlag, London, UK, 2002."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/525080.884257"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1117\/12.458790"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/882490.884218"},{"key":"e_1_3_2_1_13_1","first-page":"299","volume-title":"A visual approach for monitoring logs.Proceedings of the Twelth Systems Administration Conference","author":"Girardin L.","year":"1998","unstructured":"L. Girardin and D. Brodbeck . A visual approach for monitoring logs.Proceedings of the Twelth Systems Administration Conference ( LISA XII) (USENIX Association : Berkeley, CA ), page 299 , 1998 . L. Girardin and D. Brodbeck.A visual approach for monitoring logs.Proceedings of the Twelth Systems Administration Conference (LISA XII) (USENIX Association: Berkeley, CA), page 299, 1998."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1026195112518"},{"key":"e_1_3_2_1_15_1","first-page":"705","volume-title":"Proceedings of the 2002 Congress on Evolutionary Computation CEC2002","author":"Gonz\u00e1lez F.","year":"2002","unstructured":"F. Gonz\u00e1lez , D. Dasgupta , and R. Kozma . Combining negative selection and classification techniques for anomaly detection.In D. B. Fogel, M. A. El-Sharkawi, X. Yao, G. Greenwood, H. Iba, P. Marrow, and M. Shackleton, editors , Proceedings of the 2002 Congress on Evolutionary Computation CEC2002 , pages 705 -- 710 , USA, May 2002 . IEEE Press. F. Gonz\u00e1lez, D. Dasgupta, and R. Kozma.Combining negative selection and classification techniques for anomaly detection.In D. B. Fogel, M. A. El-Sharkawi, X. Yao, G. Greenwood, H. Iba, P. Marrow, and M. Shackleton, editors, Proceedings of the 2002 Congress on Evolutionary Computation CEC2002, pages 705--710, USA, May 2002. IEEE Press."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"F.\n      Gonz\u00e1lez D.\n      Dasgupta and \n      F.\n      Ni\u00f1o\n  .\n  A randomized real-valued negative selection algorithm\n  .In J. Timmis P. Bentley and E. Hart editors Proceedings of the 2nd International Conference on Artificial Immune Systems volume \n  2787\n   of \n  Lecture Notes in Computer Science pages \n  261\n  --\n  272\n  . \n  Springer September \n  2003\n  .  F. Gonz\u00e1lez D. Dasgupta and F. Ni\u00f1o.A randomized real-valued negative selection algorithm.In J. Timmis P. Bentley and E. Hart editors Proceedings of the 2nd International Conference on Artificial Immune Systems volume 2787 of Lecture Notes in Computer Science pages 261--272. Springer September 2003.","DOI":"10.1007\/978-3-540-45192-1_25"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2002.1011540"},{"key":"e_1_3_2_1_18_1","volume-title":"a comprehensive foundation","author":"Haykin S.","year":"1994","unstructured":"S. Haykin . Neural networks : a comprehensive foundation . Macmillan , New York , 1994 . S. Haykin.Neural networks : a comprehensive foundation.Macmillan, New York, 1994."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1162\/106365600568257"},{"key":"e_1_3_2_1_20_1","first-page":"373","article-title":"Towards a network theory of the immune system.Ann. Immunol. (Inst","volume":"125","author":"Jerne N. K.","year":"1974","unstructured":"N. K. Jerne . Towards a network theory of the immune system.Ann. Immunol. (Inst . Pasteur) , 125C : 373 -- 389 , 1974 . N. K. Jerne. Towards a network theory of the immune system.Ann. Immunol. (Inst. Pasteur), 125C:373--389, 1974.","journal-title":"Pasteur)"},{"key":"e_1_3_2_1_21_1","first-page":"130","volume-title":"Proceedings of the 4th International Workshop on the Synthesis and Simulation of Living Systems ArtificialLifeIV","author":"Kephart J. O.","year":"1994","unstructured":"J. O. Kephart . A biologically inspired immune system for computers. In R. A. Brooks and P. Maes, editors , Proceedings of the 4th International Workshop on the Synthesis and Simulation of Living Systems ArtificialLifeIV , pages 130 -- 139 , Cambridge, MA, USA , July 1994 . MIT Press. J. O. Kephart.A biologically inspired immune system for computers. In R. A. Brooks and P. Maes, editors, Proceedings of the 4th International Workshop on the Synthesis and Simulation of Living Systems ArtificialLifeIV, pages 130--139, Cambridge, MA, USA, July 1994. MIT Press."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"crossref","unstructured":"T.\n      Kohonen\n    . \n      Self-Organizing\n      Maps volume \n  30\n   of \n  Springer Series in Information Sciences\n  .Springer Berlin Heidelberg 1995\n  . \n  (Second Extended Edition\n   1997).   T. Kohonen. Self-Organizing Maps volume 30 of Springer Series in Information Sciences.Springer Berlin Heidelberg 1995. (Second Extended Edition 1997).","DOI":"10.1007\/978-3-642-97966-8"},{"key":"e_1_3_2_1_23_1","volume-title":"Proceedings of the Second Annual Conference on Privacy, Security and Trust (PST'04)","author":"Onut I.-V.","year":"2004","unstructured":"I.-V. Onut , B. Zhu , and A. A. Ghorbani . A novel visualization technique for network anomaly detection . In Proceedings of the Second Annual Conference on Privacy, Security and Trust (PST'04) , New Brunswick, Canada, oct 2004 . I.-V. Onut, B. Zhu, and A. A. Ghorbani. A novel visualization technique for network anomaly detection. In Proceedings of the Second Annual Conference on Privacy, Security and Trust (PST'04), New Brunswick, Canada, oct 2004."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"crossref","unstructured":"A.\n      Secker A.\n      Freitas and \n      J.\n      Timmis\n  .\n  A danger theory approach to web mining\n  .In J. Timmis P. Bentley and E. Hart editors Proceedings of the 2nd International Conference on Artificial Immune Systems volume \n  2787\n   of \n  Lecture Notes in Computer Science pages \n  156\n  --\n  167\n  . \n  Springer-Verlag September \n  2003\n  .  A. Secker A. Freitas and J. Timmis.A danger theory approach to web mining.In J. Timmis P. Bentley and E. Hart editors Proceedings of the 2nd International Conference on Artificial Immune Systems volume 2787 of Lecture Notes in Computer Science pages 156--167. Springer-Verlag September 2003.","DOI":"10.1007\/978-3-540-45192-1_16"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCG.2004.26"},{"key":"e_1_3_2_1_26_1","first-page":"129","volume-title":"Computer know thy self! : a biological way to look at fault tolerance.In Proceedings of the 2nd Euromicro\/Ieee workshop on Dependable Computing Systems","author":"Tyrrell A.","year":"1999","unstructured":"A. Tyrrell . Computer know thy self! : a biological way to look at fault tolerance.In Proceedings of the 2nd Euromicro\/Ieee workshop on Dependable Computing Systems , pages 129 -- 135 , Milan , 1999 . A. Tyrrell. Computer know thy self! : a biological way to look at fault tolerance.In Proceedings of the 2nd Euromicro\/Ieee workshop on Dependable Computing Systems, pages 129--135, Milan, 1999."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.5555\/645839.670740"}],"event":{"name":"GECCO05: Genetic and Evolutionary Computation Conference","sponsor":["SIGEVO ACM Special Interest Group on Genetic and Evolutionary Computation","ACM Association for Computing Machinery"],"location":"Washington DC USA","acronym":"GECCO05"},"container-title":["Proceedings of the 7th annual conference on Genetic and evolutionary computation"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1068009.1068058","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1068009.1068058","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T16:31:40Z","timestamp":1750264300000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1068009.1068058"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,6,25]]},"references-count":26,"alternative-id":["10.1145\/1068009.1068058","10.1145\/1068009"],"URL":"https:\/\/doi.org\/10.1145\/1068009.1068058","relation":{},"subject":[],"published":{"date-parts":[[2005,6,25]]},"assertion":[{"value":"2005-06-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}