{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,15]],"date-time":"2024-09-15T20:36:58Z","timestamp":1726432618520},"publisher-location":"Berlin, Heidelberg","reference-count":27,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540929154"},{"type":"electronic","value":"9783540929161"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-92916-1_16","type":"book-chapter","created":{"date-parts":[[2009,1,5]],"date-time":"2009-01-05T11:40:48Z","timestamp":1231155648000},"page":"375-395","source":"Crossref","is-referenced-by-count":14,"title":["Artificial Dendritic Cells: Multi-faceted Perspectives"],"prefix":"10.1007","author":[{"given":"Julie","family":"Greensmith","sequence":"first","affiliation":[]},{"given":"Uwe","family":"Aickelin","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"16_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1007\/978-3-540-45192-1_15","volume-title":"Artificial Immune Systems","author":"U. Aickelin","year":"2003","unstructured":"Aickelin, U., et al.: Danger Theory: The link between AIS and IDS. In: Timmis, J., Bentley, P.J., Hart, E. (eds.) ICARIS 2003. LNCS, vol.\u00a02787, pp. 147\u2013155. Springer, Heidelberg (2003)"},{"key":"16_CR2","doi-asserted-by":"crossref","unstructured":"Al-Hammadi, Y., Aickelin, U., Greensmith, J.: DCA for detecting bots. In: Proc. of the Congress on Evolutionary Computation (CEC) (2008)","DOI":"10.2139\/ssrn.2830396"},{"key":"16_CR3","unstructured":"Balthrop, J.: RIOT: A responsive system for mitigating computer network epidemics and attacks. Master\u2019s thesis, University of New Mexico (2005)"},{"key":"16_CR4","doi-asserted-by":"crossref","unstructured":"Bargiela, A., Pedrycz, W.: Granular Computing: An Introduction. Springer International Series in Engineering and Computer Science, vol.\u00a0717 (2003)","DOI":"10.1007\/978-1-4615-1033-8"},{"issue":"7","key":"16_CR5","doi-asserted-by":"publisher","first-page":"569","DOI":"10.1038\/nri2102","volume":"7","author":"I.R. Cohen","year":"2007","unstructured":"Cohen, I.R.: Real and artificial immune systems: computing the state of the body. Nature Reviews in Immunology\u00a07(7), 569\u2013574 (2007)","journal-title":"Nature Reviews in Immunology"},{"issue":"3","key":"16_CR6","doi-asserted-by":"crossref","first-page":"239","DOI":"10.1109\/TEVC.2002.1011539","volume":"6","author":"L.N. Castro de","year":"2002","unstructured":"de Castro, L.N., Von Zuben, F.: Learning and Optimization Using the Clonal Selection Principle. IEEE Transactions on Evolutionary Computation, Special Issue on Artificial Immune Systems\u00a06(3), 239\u2013251 (2002)","journal-title":"IEEE Transactions on Evolutionary Computation, Special Issue on Artificial Immune Systems"},{"key":"16_CR7","first-page":"202","volume-title":"Proc. of the IEEE Symposium on Security and Privacy","author":"S. Forrest","year":"1994","unstructured":"Forrest, S., Perelson, A., Allen, L., Cherukuri, R.: Self-nonself discrimination in a computer. In: Proc. of the IEEE Symposium on Security and Privacy, pp. 202\u2013209. IEEE Computer Society, Los Alamitos (1994)"},{"key":"16_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"404","DOI":"10.1007\/11823940_31","volume-title":"Artificial Immune Systems","author":"J. Greensmith","year":"2006","unstructured":"Greensmith, J., Aickelin, U., Twycross, J.: Articulation and clarification of the Dendritic Cell Algorithm. In: Bersini, H., Carneiro, J. (eds.) ICARIS 2006. LNCS, vol.\u00a04163, pp. 404\u2013417. Springer, Heidelberg (2006)"},{"key":"16_CR9","unstructured":"Greensmith, J.: The Dendritic Cell Algorithm. PhD thesis, School of Computer Science, University Of Nottingham (2007)"},{"key":"16_CR10","doi-asserted-by":"crossref","unstructured":"Greensmith, J., Aickelin, U.: The Deterministic Dendritic Cell Algorithm. In: Proc. of the 7th International Conference on Artificial Immune Systems, ICARIS (to appear, 2008)","DOI":"10.1007\/978-3-540-85072-4_26"},{"issue":"2","key":"16_CR11","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1007\/s12065-008-0008-6","volume":"1","author":"J. Greensmith","year":"2008","unstructured":"Greensmith, J., Aickelin, U., Feyereisl, J.: The DCA-SOMe comparison: A comparative study between two biologically-inspired algorithms. Evolutionary Intelligence: Special Issue on Artificial Immune Systems\u00a01(2), 85\u2013112 (2008)","journal-title":"Evolutionary Intelligence: Special Issue on Artificial Immune Systems"},{"key":"16_CR12","doi-asserted-by":"crossref","unstructured":"Gu, F., Greensmith, J., Aickelin, U.: Further Exploration of the Dendritic Cell Algorithm: Antigen Multiplier and Time Windows. In: Proc. of the 7th International Conference on Artificial Immune Systems (to appear, 2008)","DOI":"10.1007\/978-3-540-85072-4_13"},{"key":"16_CR13","unstructured":"Hofmeyr, S.: An immunological model of distributed detection and its application to computer security. PhD thesis, University Of New Mexico (1999)"},{"key":"16_CR14","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1101\/SQB.1989.054.01.003","volume":"1","author":"C. Janeway","year":"1989","unstructured":"Janeway, C.: Approaching the asymptote? Evolution and revolution in immunology. Cold Spring Harbor Symposium on Quant Biology\u00a01, 1\u201313 (1989)","journal-title":"Cold Spring Harbor Symposium on Quant Biology"},{"key":"16_CR15","unstructured":"Kim, J., Bentley, P.: Evaluating negative selection in an artificial immune system for network intrusion detection. In: Proc. of the Genetic and Evolutionary Computation Conference (GECCO), pp. 1330\u20131337 (July 2001)"},{"key":"16_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"390","DOI":"10.1007\/11823940_30","volume-title":"Artificial Immune Systems","author":"J. Kim","year":"2006","unstructured":"Kim, J., Bentley, P., Wallenta, C., Ahmed, M., Hailes, S.: Danger is ubiquitous: Detecting malicious activities in sensor networks using the dendritic cell algorithm. In: Bersini, H., Carneiro, J. (eds.) ICARIS 2006. LNCS, vol.\u00a04163, pp. 390\u2013403. Springer, Heidelberg (2006)"},{"issue":"9","key":"16_CR17","doi-asserted-by":"publisher","first-page":"991","DOI":"10.1016\/S1471-4906(02)02281-0","volume":"23","author":"M. Lutz","year":"2002","unstructured":"Lutz, M., Schuler, G.: Immature, semi-mature and fully mature dendritic cells: which signals induce tolerance or immunity? Trends in Immunology\u00a023(9), 991\u20131045 (2002)","journal-title":"Trends in Immunology"},{"key":"16_CR18","doi-asserted-by":"crossref","first-page":"991","DOI":"10.1146\/annurev.iy.12.040194.005015","volume":"12","author":"P. Matzinger","year":"1994","unstructured":"Matzinger, P.: Tolerance, danger and the extended family. Annual Reviews in Immunology\u00a012, 991\u20131045 (1994)","journal-title":"Annual Reviews in Immunology"},{"key":"16_CR19","doi-asserted-by":"crossref","unstructured":"Murphy, K., Travers, P., Walport, M.: Janeway\u2019s Immunobiology, 7th edn. Garland Science (2008)","DOI":"10.1007\/978-3-662-44228-9"},{"key":"16_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"204","DOI":"10.1007\/978-3-540-73922-7_18","volume-title":"Artificial Immune Systems","author":"R. Oates","year":"2007","unstructured":"Oates, R., Greensmith, J., Aickelin, U., Garibaldi, J., Kendall, G.: The application of a dendritic cell algorithm to a robotic classifier. In: de Castro, L.N., Von Zuben, F.J., Knidel, H. (eds.) ICARIS 2007. LNCS, vol.\u00a04628, pp. 204\u2013215. Springer, Heidelberg (2007)"},{"key":"16_CR21","doi-asserted-by":"crossref","unstructured":"Oates, R., Kendall, G., Greensmith, J.: Frequency analysis for dendritic cell population tuning: Decimating the dendritic cell. Evolutionary Intelligence: Special Issue on Artificial Immune Systems (2008)","DOI":"10.1007\/s12065-008-0011-y"},{"issue":"7","key":"16_CR22","doi-asserted-by":"publisher","first-page":"639","DOI":"10.1038\/ni0705-639","volume":"6","author":"A. Silverstein","year":"2005","unstructured":"Silverstein, A.: Paul Ehrlich, archives and the history of immunology. Nature Immunology\u00a06(7), 639\u2013639 (2005)","journal-title":"Nature Immunology"},{"key":"16_CR23","doi-asserted-by":"crossref","unstructured":"Stibor, T., Mohr, P., Timmis, J., Eckert, C.: Is negative selection appropriate for anomaly detection? In: Proc. of Genetic and Evolutionary Computation Conference (GECCO), pp. 321\u2013328 (2005)","DOI":"10.1145\/1068009.1068061"},{"key":"16_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1007\/11823940_10","volume-title":"Artificial Immune Systems","author":"T. Stibor","year":"2006","unstructured":"Stibor, T., Timmis, J., Eckert, C.: On permutation masks in hamming negative selection. In: Bersini, H., Carneiro, J. (eds.) ICARIS 2006. LNCS, vol.\u00a04163, pp. 122\u2013135. Springer, Heidelberg (2006)"},{"key":"16_CR25","volume-title":"Artificial Immune Systems: A New Computational Approach","author":"L. Castro de","year":"2002","unstructured":"de Castro, L., Timmis, J.: Artificial Immune Systems: A New Computational Approach. Springer, London (2002)"},{"key":"16_CR26","doi-asserted-by":"crossref","unstructured":"Twycross, J., Aickelin, U.: libtissue - implementing innate immunity. In: Proc. of the Congress on Evolutionary Computation (CEC), pp. 499\u2013506 (2006)","DOI":"10.1109\/CEC.2006.1688351"},{"key":"16_CR27","unstructured":"Zhou, J., Dasgupta, D.: Applicability issues of the real-valued negative selection algorithms. In: Proc. of the Genetic and Evolutionary Computation Conference (GECCO 2006), pp. 111\u2013118 (2006)"}],"container-title":["Studies in Computational Intelligence","Human-Centric Information Processing Through Granular Modelling"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-92916-1_16.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T08:17:17Z","timestamp":1619511437000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-92916-1_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540929154","9783540929161"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-92916-1_16","relation":{},"ISSN":["1860-949X","1860-9503"],"issn-type":[{"type":"print","value":"1860-949X"},{"type":"electronic","value":"1860-9503"}],"subject":[]}}