{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,15]],"date-time":"2026-01-15T02:42:42Z","timestamp":1768444962381,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","license":[{"start":{"date-parts":[[2005,6,25]],"date-time":"2005-06-25T00:00:00Z","timestamp":1119657600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2005,6,25]]},"DOI":"10.1145\/1068009.1068061","type":"proceedings-article","created":{"date-parts":[[2005,8,3]],"date-time":"2005-08-03T08:31:47Z","timestamp":1123057907000},"page":"321-328","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":101,"title":["Is negative selection appropriate for anomaly detection?"],"prefix":"10.1145","author":[{"given":"Thomas","family":"Stibor","sequence":"first","affiliation":[{"name":"Darmstadt University of Technology, Darmstadt, Germany"}]},{"given":"Philipp","family":"Mohr","sequence":"additional","affiliation":[{"name":"University of Kent"}]},{"given":"Jonathan","family":"Timmis","sequence":"additional","affiliation":[{"name":"University of Kent"}]},{"given":"Claudia","family":"Eckert","sequence":"additional","affiliation":[{"name":"Darmstadt University of Technology, Darmstadt, Germany"}]}],"member":"320","published-online":{"date-parts":[[2005,6,25]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"89","volume-title":"1st Int. Conf. on Artificial Immune Systems","author":"Ayara M.","year":"2002","unstructured":"M. Ayara , J. Timmis , L. de Lemos , R. de Castro , and R. Duncan . Negative selection: How to generate detectors . In 1st Int. Conf. on Artificial Immune Systems , pages 89 -- 98 , September 2002 . M. Ayara, J. Timmis, L. de Lemos, R. de Castro, and R. Duncan. Negative selection: How to generate detectors. In 1st Int. Conf. on Artificial Immune Systems, pages 89--98, September 2002."},{"key":"e_1_3_2_1_2_1","first-page":"3","volume-title":"GECCO 2002: Proc. of the Genetic and Evolutionary Computation Conf.","author":"Balthrop J.","year":"2002","unstructured":"J. Balthrop , F. Esponda , S. Forrest , and M. Glickman . Coverage and generalization in an artificial immune system . In GECCO 2002: Proc. of the Genetic and Evolutionary Computation Conf. , pages 3 -- 10 , New York , 9-13 July 2002 . Morgan Kaufmann Publishers. J. Balthrop, F. Esponda, S. Forrest, and M. Glickman. Coverage and generalization in an artificial immune system. In GECCO 2002: Proc. of the Genetic and Evolutionary Computation Conf., pages 3--10, New York, 9-13 July 2002. Morgan Kaufmann Publishers."},{"key":"e_1_3_2_1_3_1","volume-title":"December","author":"Chang C.-C.","year":"2004","unstructured":"C.-C. Chang and C.-J. Lin . LIBSVM: a Library for Support Vector Machines (http:\/\/www.csie.ntu.edu.tw\/~cjlin\/papers\/libsvm.pdf) , December 2004 . C.-C. Chang and C.-J. Lin. LIBSVM: a Library for Support Vector Machines (http:\/\/www.csie.ntu.edu.tw\/~cjlin\/papers\/libsvm.pdf), December 2004."},{"key":"e_1_3_2_1_4_1","volume-title":"Proc. of the 5th Int. Conf. on Intelligent Systems. IEEE Computer Society Press","author":"Dasgupta D.","year":"1996","unstructured":"D. Dasgupta , S. Forrest . Novelty Detection in Time Series Data Using Ideas from Immunology . In Proc. of the 5th Int. Conf. on Intelligent Systems. IEEE Computer Society Press , 1996 . D. Dasgupta, S. Forrest. Novelty Detection in Time Series Data Using Ideas from Immunology. In Proc. of the 5th Int. Conf. on Intelligent Systems. IEEE Computer Society Press, 1996."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/0167-5699(93)90322-C"},{"key":"e_1_3_2_1_6_1","volume-title":"Artificial Immune Systems: A New Computational Intelligence Approach","author":"de Castro L. N.","year":"2002","unstructured":"L. N. de Castro and J. Timmis . Artificial Immune Systems: A New Computational Intelligence Approach . Springer-Verlag , 2002 . L. N. de Castro and J. Timmis. Artificial Immune Systems: A New Computational Intelligence Approach. Springer-Verlag, 2002."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/794196.795064"},{"key":"e_1_3_2_1_8_1","series-title":"LNCS","first-page":"1","volume-title":"Advanced Lectures on Machine Learning","author":"Yom-Tov Elad","year":"2004","unstructured":"Elad Yom-Tov . An Introduction to Pattern Classification . In Advanced Lectures on Machine Learning , volume 3176 of LNCS , pages 1 -- 20 . Springer-Verlag , 2004 . Elad Yom-Tov. An Introduction to Pattern Classification. In Advanced Lectures on Machine Learning, volume 3176 of LNCS, pages 1--20. Springer-Verlag, 2004."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCB.2003.817026"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45192-1_22"},{"key":"e_1_3_2_1_12_1","series-title":"LNCS","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1007\/3-540-45105-6_25","volume-title":"Genetic and Evolutionary Computation -- GECCO-2003","author":"Gonz\u00e1lez F.","year":"2003","unstructured":"F. Gonz\u00e1lez , D. Dasgupta , and G. Gomez . The effect of binary matching rules in negative selection . In Genetic and Evolutionary Computation -- GECCO-2003 , volume 2723 of LNCS , pages 195 -- 206 , Chicago, 12-16 July 2003 . Springer-Verlag . F. Gonz\u00e1lez, D. Dasgupta, and G. Gomez. The effect of binary matching rules in negative selection. In Genetic and Evolutionary Computation -- GECCO-2003, volume 2723 of LNCS, pages 195--206, Chicago, 12-16 July 2003. Springer-Verlag."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2002.1007012"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45192-1_25"},{"key":"e_1_3_2_1_15_1","unstructured":"S. A. Hofmeyer. An Interpretative Introduction to the Immune System 2000.  S. A. Hofmeyer. An Interpretative Introduction to the Immune System 2000."},{"key":"e_1_3_2_1_16_1","volume-title":"July","author":"Hsu C.-W.","year":"2003","unstructured":"C.-W. Hsu , C.-C. Chang , and C.-J. Lin . A Pratical Guide to Support Vector Classification (http:\/\/www.csie.ntu.edu.tw\/~cjlin\/papers\/guide\/guide.pdf) , July 2003 . C.-W. Hsu, C.-C. Chang, and C.-J. Lin. A Pratical Guide to Support Vector Classification (http:\/\/www.csie.ntu.edu.tw\/~cjlin\/papers\/guide\/guide.pdf), July 2003."},{"key":"e_1_3_2_1_17_1","volume-title":"Immunologie","author":"Janeway C. A.","year":"2002","unstructured":"C. A. Janeway , P. Travers , M. Walport , and M. Shlomchik . Immunologie . Spektrum Akademischer Verlag , 2002 . C. A. Janeway, P. Travers, M. Walport, and M. Shlomchik. Immunologie. Spektrum Akademischer Verlag, 2002."},{"key":"e_1_3_2_1_18_1","series-title":"LNCS","doi-asserted-by":"crossref","first-page":"287","DOI":"10.1007\/978-3-540-24854-5_30","volume-title":"Genetic and Evolutionary Computation -- GECCO-2004, Part I","author":"Ji Z.","year":"2004","unstructured":"Z. Ji and D. Dasgupta . Real-valued negative selection algorithm with variable-sized detectors . In Genetic and Evolutionary Computation -- GECCO-2004, Part I , volume 3102 of LNCS , pages 287 -- 298 , Seattle, WA , USA, 26-30 June 2004 . Springer-Verlag . Z. Ji and D. Dasgupta. Real-valued negative selection algorithm with variable-sized detectors. In Genetic and Evolutionary Computation -- GECCO-2004, Part I, volume 3102 of LNCS, pages 287--298, Seattle, WA, USA, 26-30 June 2004. Springer-Verlag."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/72.914517"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.90.5.1691"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/0022-5193(79)90275-3"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/882490.884218"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2003.1299566"},{"key":"e_1_3_2_1_26_1","series-title":"LNCS","doi-asserted-by":"crossref","first-page":"299","DOI":"10.1007\/978-3-540-24854-5_31","volume-title":"Genetic and Evolutionary Computation -- GECCO-2004, Part I","author":"Stibor T.","year":"2004","unstructured":"T. Stibor , K. M. Bayarou , and C. Eckert . An investigation of R-chunk detector generation on higher alphabets . In Genetic and Evolutionary Computation -- GECCO-2004, Part I , volume 3102 of LNCS , pages 299 -- 307 , Seattle, WA , USA, 26-30 June 2004 . Springer-Verlag . T. Stibor, K. M. Bayarou, and C. Eckert. An investigation of R-chunk detector generation on higher alphabets. In Genetic and Evolutionary Computation -- GECCO-2004, Part I, volume 3102 of LNCS, pages 299--307, Seattle, WA, USA, 26-30 June 2004. Springer-Verlag."},{"key":"e_1_3_2_1_27_1","unstructured":"P. Vlachos. StatLib. http:\/\/lib.stat.cmu.edu.  P. Vlachos. StatLib. http:\/\/lib.stat.cmu.edu."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251972.1252459"}],"event":{"name":"GECCO05: Genetic and Evolutionary Computation Conference","location":"Washington DC USA","acronym":"GECCO05","sponsor":["SIGEVO ACM Special Interest Group on Genetic and Evolutionary Computation","ACM Association for Computing Machinery"]},"container-title":["Proceedings of the 7th annual conference on Genetic and evolutionary computation"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1068009.1068061","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1068009.1068061","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T16:31:40Z","timestamp":1750264300000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1068009.1068061"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,6,25]]},"references-count":25,"alternative-id":["10.1145\/1068009.1068061","10.1145\/1068009"],"URL":"https:\/\/doi.org\/10.1145\/1068009.1068061","relation":{},"subject":[],"published":{"date-parts":[[2005,6,25]]},"assertion":[{"value":"2005-06-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}