{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T18:02:17Z","timestamp":1725559337118},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642145469"},{"type":"electronic","value":"9783642145476"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-14547-6_9","type":"book-chapter","created":{"date-parts":[[2010,7,16]],"date-time":"2010-07-16T02:32:37Z","timestamp":1279247557000},"page":"102-115","source":"Crossref","is-referenced-by-count":18,"title":["FDCM: A Fuzzy Dendritic Cell Method"],"prefix":"10.1007","author":[{"given":"Zeineb","family":"Chelly","sequence":"first","affiliation":[]},{"given":"Zied","family":"Elouedi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"9_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1007\/978-3-540-45192-1_15","volume-title":"Artificial Immune Systems","author":"U. Aickelin","year":"2003","unstructured":"Aickelin, U., Bentley, P., Cayzer, S., Kim, J., McLeod, J.: Danger Theory: The Link between AIS and IDS. In: Timmis, J., Bentley, P.J., Hart, E. (eds.) ICARIS 2003. LNCS, vol.\u00a02787, pp. 147\u2013155. Springer, Heidelberg (2003)"},{"key":"9_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1007\/11536444_12","volume-title":"Artificial Immune Systems","author":"J. Greensmith","year":"2005","unstructured":"Greensmith, J., Aickelin, U., Cayzer, S.: Introducing Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomaly Detection. In: Jacob, C., Pilat, M.L., Bentley, P.J., Timmis, J.I. (eds.) ICARIS 2005. LNCS, vol.\u00a03627, pp. 153\u2013167. Springer, Heidelberg (2005)"},{"key":"9_CR3","volume-title":"Fuzzy Logic for Engineering Applications","author":"T. Ross","year":"1995","unstructured":"Ross, T.: Fuzzy Logic for Engineering Applications. McGraw-Hill Book Company, New York (1995)"},{"key":"9_CR4","unstructured":"UCI machine learning repository, http:\/\/archive.ics.uci.edu"},{"key":"9_CR5","doi-asserted-by":"publisher","first-page":"338","DOI":"10.1016\/S0019-9958(65)90241-X","volume":"8","author":"L. Zadeh","year":"1965","unstructured":"Zadeh, L.: Fuzzy Sets. Information and Control\u00a08, 338\u2013353 (1965)","journal-title":"Information and Control"},{"key":"9_CR6","first-page":"227","volume":"1","author":"J. Zimmermann","year":"1996","unstructured":"Zimmermann, J.: Fuzzy Set Theory and Its Applications. European Journal of Operational Research\u00a01, 227\u2013228 (1996)","journal-title":"European Journal of Operational Research"},{"key":"9_CR7","doi-asserted-by":"crossref","unstructured":"Pedrycz, W., Zadeh, L.: Fuzzy Sets Engineering 1. IEEE Micro, 19\u201330 (1995)","DOI":"10.1109\/40.400639"},{"issue":"4","key":"9_CR8","doi-asserted-by":"publisher","first-page":"506","DOI":"10.1109\/91.940964","volume":"9","author":"H. Ishibuchi","year":"2001","unstructured":"Ishibuchi, H., Nakashima, T.: Effect of rule weights in fuzzy rule-based classification systems. IEEE Transactions on Fuzzy Systems\u00a09(4), 506\u2013515 (2001)","journal-title":"IEEE Transactions on Fuzzy Systems"},{"key":"9_CR9","doi-asserted-by":"crossref","unstructured":"Matzinger, P.: The Danger Model in its historical context. Scandinavian Journal of Immunology, 4\u20139 (2001)","DOI":"10.1046\/j.1365-3083.2001.00974.x"},{"key":"9_CR10","doi-asserted-by":"crossref","unstructured":"Roberto, A., Myriam, D., Heitor, S., Alex, A.: An artificial immune system for fuzzy-rule induction in data mining. In: 8th Brazilian Symposium on Naturel Network, pp. 1011\u20131020 (2004)","DOI":"10.1007\/978-3-540-30217-9_102"},{"key":"9_CR11","doi-asserted-by":"crossref","unstructured":"Greensmith, J.: The Dendritic Cell Algorithm. PhD Thesis, University of Nottingham (2007)","DOI":"10.2139\/ssrn.2831280"},{"key":"9_CR12","unstructured":"Stibor, T.: On the appropriateness of negative selection for anomaly detection and network intrusion detection. PhD Thesis, Darmstadt University of Technology (2006)"},{"key":"9_CR13","unstructured":"Nauman, M., Muddassar, F.: A Sense of Danger: Dendritic Cells Inspired Artificial Immune System for MANET Security. In: Genetic and Evolutionary Computation Conference, pp. 102\u2013109 (2007)"},{"key":"9_CR14","doi-asserted-by":"crossref","unstructured":"Mamdani, E.H., Assilian, S.: An experiment in linguistic synthesis with a fuzzy logic controller. International Journal of Man-Machine Studies, 1\u201313 (1975)","DOI":"10.1016\/S0020-7373(75)80002-2"},{"key":"9_CR15","doi-asserted-by":"crossref","unstructured":"Kyosev, Y., Peeva, K., Reinbach, I.: Max-Product Fuzzy Relational Equations as Inference Engine for Prediction of Textile Yarn Properties. In: 9th Fuzzy Days, pp. 18\u201320 (2006)","DOI":"10.1007\/3-540-34783-6_11"},{"key":"9_CR16","unstructured":"Mizumoto, M.: Fuzzy controls by product-sum gravity-method. Fuzzy Sets and Systems, c1.1\u2013c1.4 (1990)"},{"key":"9_CR17","doi-asserted-by":"crossref","unstructured":"Van Broekhoven, E., De Baets, B.: Fast and accurate center of gravity defuzzification of fuzzy system outputs defined on trapezoidal fuzzy partitions. Fuzzy sets and systems, 904\u2013918 (2006)","DOI":"10.1016\/j.fss.2005.11.005"},{"key":"9_CR18","doi-asserted-by":"crossref","unstructured":"Lee, C.: Fuzzy logic in control systems: Fuzzy logic controller - Parts 1 and 2. IEEE Transactions on Systems, Man and Cybernetics, 404\u2013435 (1990)","DOI":"10.1109\/21.52551"},{"key":"9_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"142","DOI":"10.1007\/978-3-540-85072-4_13","volume-title":"Artificial Immune Systems","author":"F. Gu","year":"2008","unstructured":"Gu, F., Greensmith, J., Aickelin, U.: Further Exploration of the Dendritic Cell Algorithm: Antigen Multiplier and Time Windows. In: Bentley, P.J., Lee, D., Jung, S. (eds.) ICARIS 2008. LNCS, vol.\u00a05132, pp. 142\u2013153. Springer, Heidelberg (2008)"},{"key":"9_CR20","series-title":"Lecture Notes in Computer Science","first-page":"291","volume-title":"Artificial Immune Systems","author":"U. Aickelin","year":"2008","unstructured":"Aickelin, U., Greensmith, J.: The Deterministic Dendritic Cell Algorithm. In: Bentley, P.J., Lee, D., Jung, S. (eds.) ICARIS 2008. LNCS, vol.\u00a05132, pp. 291\u2013302. Springer, Heidelberg (2008)"}],"container-title":["Lecture Notes in Computer Science","Artificial Immune Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-14547-6_9.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,31]],"date-time":"2021-10-31T14:22:04Z","timestamp":1635690124000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-14547-6_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642145469","9783642145476"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-14547-6_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}