{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,3,20]],"date-time":"2023-03-20T00:26:52Z","timestamp":1679272012389},"reference-count":54,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["New Gener. Comput."],"published-print":{"date-parts":[[2015,1]]},"DOI":"10.1007\/s00354-015-0101-1","type":"journal-article","created":{"date-parts":[[2015,1,27]],"date-time":"2015-01-27T11:00:00Z","timestamp":1422356400000},"page":"1-31","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["Hybridization Schemes of the Fuzzy Dendritic Cell Immune Binary Classifier based on Different Fuzzy Clustering Techniques"],"prefix":"10.1007","volume":"33","author":[{"given":"Zeineb","family":"Chelly","sequence":"first","affiliation":[]},{"given":"Zied","family":"Elouedi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,1,28]]},"reference":[{"key":"101_CR1","unstructured":"Eiben, A. E. and Smith, J.E., Introduction to Evolutionary Computing, Natural Computing Series, 2nd edition, Springer, 2007."},{"key":"101_CR2","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1007\/BF03037489","volume":"23","author":"F. Hsua","year":"2005","unstructured":"Hsua F., Huang P.: \u201cProviding an appropriate search space to solve the fatigue problem in interactive evolutionary computation\u201d. New Generation Computing 23, 115\u2013127 (2005)","journal-title":"New Generation Computing"},{"key":"101_CR3","doi-asserted-by":"crossref","first-page":"171","DOI":"10.1007\/BF03037493","volume":"23","author":"M. Lewis","year":"2005","unstructured":"Lewis M., Ruston K.: \u201cAesthetic geometry evolution in a generic interactive evolutionary design framework\u201d. New Generation Computing 23, 171\u2013179 (2005)","journal-title":"New Generation Computing"},{"key":"101_CR4","doi-asserted-by":"crossref","first-page":"185","DOI":"10.1007\/s00354-010-0104-x","volume":"29","author":"M. Csorba","year":"2011","unstructured":"Csorba M., Meling H., Heegaard E.: \u201cA bio-inspired method for distributed deployment of services\u201d. New Generation Computing 29, 185\u2013222 (2011)","journal-title":"New Generation Computing"},{"key":"101_CR5","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1046\/j.1365-3083.2001.00974.x","volume":"54","author":"P. Matzinger","year":"2001","unstructured":"Matzinger P.: \u201cThe danger model in it\u2019s historical context\u201d. Scandinavian Journal of Immunology 54, 4\u20139 (2001)","journal-title":"Scandinavian Journal of Immunology"},{"key":"101_CR6","doi-asserted-by":"crossref","unstructured":"Greensmith, J. and Aickelin, U., \u201cIntroducing dendritic cells as a novel immune-inspired algorithm for anomaly detection,\u201d in Proc. of the 4th International Conference on Artificial Immune Systems, Springer, pp. 153\u2013167, 2005.","DOI":"10.1007\/11536444_12"},{"key":"101_CR7","doi-asserted-by":"crossref","unstructured":"Greensmith, J., Aickelin, U. and Twycross, J., \u201cArticulation and clarification of the dendritic cell algorithm,\u201d in ICARIS, Springer, pp. 404\u2013417, 2006.","DOI":"10.1007\/11823940_31"},{"key":"101_CR8","unstructured":"Greensmith, J. and Aickelin, U., \u201cFurther exploration of the dendritic cell algorithm,\u201d in Proc. of the 6th International Conference on Artificial Immune Systems, Springer, pp. 142\u2013153, 2007."},{"key":"101_CR9","doi-asserted-by":"crossref","unstructured":"Greensmith, J. and Aickelin, U., \u201cThe application of a dendritic cell algorithm to a robotic classifier,\u201d in Proc. of the 6th International Conference on Artificial Immune Systems, Springer, pp. 204\u2013215, 2007.","DOI":"10.1007\/978-3-540-73922-7_18"},{"key":"101_CR10","doi-asserted-by":"crossref","unstructured":"Greensmith, J. and Aickelin, U., \u201cThe deterministic dendritic cell algorithm,\u201d in ICARIS, pp. 291\u2013302, 2008.","DOI":"10.1007\/978-3-540-85072-4_26"},{"key":"101_CR11","doi-asserted-by":"crossref","unstructured":"Chelly, Z. and Elouedi, Z., \u201cFurther exploration of the fuzzy dendritic cell method,\u201d in Proc. of the 10th International Conference of Artificial Immune Systems, Springer, pp. 419\u2013432, 2011.","DOI":"10.1007\/978-3-642-22371-6_36"},{"key":"101_CR12","doi-asserted-by":"crossref","first-page":"338","DOI":"10.1016\/S0019-9958(65)90241-X","volume":"8","author":"L. Zadeh","year":"1965","unstructured":"Zadeh L.: \u201cFuzzy sets\u201d. Information and Control 8, 338\u2013353 (1965)","journal-title":"Information and Control"},{"key":"101_CR13","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1080\/01969727308546046","volume":"3","author":"C. Dunn","year":"1973","unstructured":"Dunn C.: \u201cA fuzzy relative of the isodata process and its use in detecting compact well-separated clusters\u201d. Journal of Cybernetics 3, 32\u201357 (1973)","journal-title":"Journal of Cybernetics"},{"key":"101_CR14","doi-asserted-by":"crossref","first-page":"223","DOI":"10.1162\/evco.2007.15.2.223","volume":"15","author":"J. Zhou","year":"2007","unstructured":"Zhou J.: \u201cRevisiting negative selection algorithms\u201d. Evolutionary Computation 15, 223\u2013251 (2007)","journal-title":"Evolutionary Computation"},{"key":"101_CR15","unstructured":"Stibor, T., \u201cOn the appropriateness of negative selection for anomaly detection and network intrusion detection,\u201d Ph.D. thesis, Darmstadt University of Technology, 2006."},{"key":"101_CR16","doi-asserted-by":"crossref","unstructured":"Lutz, M. and Schuler, G., \u201cImmature, semi-mature and fully mature dendritic cells: which signals induce tolerance or immunity?\u201d Trends in Immunology, 23, pp. 991\u20131045, 2002.","DOI":"10.1016\/S1471-4906(02)02281-0"},{"key":"101_CR17","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1016\/j.inffus.2009.04.006","volume":"11","author":"J. Greensmith","year":"2010","unstructured":"Greensmith J., Aickelin U., Tedesco G.: \u201cInformation fusion for anomaly detection with the dendritic cell algorithm\u201d. Information Fusion 11, 21\u201334 (2010)","journal-title":"Information Fusion"},{"key":"101_CR18","doi-asserted-by":"crossref","unstructured":"Twycross, J., Greensmith, J. and Aickelin, U., \u201cDendritic cells for anomaly detection,\u201d in Proc. of the Congress on Evolutionary Computation, pp. 664\u2013671, 2006.","DOI":"10.2139\/ssrn.2831377"},{"key":"101_CR19","unstructured":"Greensmith, J., Feyereisl, J. and Aickelin, U., \u201cThe dca:some comparison a comparative study between two biologically-inspired algorithms,\u201d CoRR, abs\/1006.1518 , 2010."},{"key":"101_CR20","unstructured":"Al-Hammadi, Y., Aickelin, U. and Greensmith, J., \u201cDca for detecting bots,\u201d in IEEE World Congress on Computational Intelligence, pp. 1807\u20131816, 2008."},{"key":"101_CR21","unstructured":"Kim, J., Bentley, P., Wallenta, C., Ahmed, M. and Hailes, S., \u201cDanger is ubiquitous: Detecting malicious activities in sensor networks using the dendritic cell algorithm,\u201d in Evolutionary Intelligence: Special Issue on Artificial Immune Systems, 2008."},{"key":"101_CR22","unstructured":"Lay, N. and Bate, I., \u201cImproving the reliability of real-time embedded systems using innate immune techniques,\u201d in ICARIS, pp. 390\u2013403, 2006."},{"key":"101_CR23","unstructured":"Asuncion, A. and Newman, D., Uci machine learning repository, http:\/\/www.ics.uci.edu\/mlearn\/ , 2007."},{"key":"101_CR24","unstructured":"Greensmith, J., \u201cThe Dendritic Cell Algorithm,\u201d Ph.D. thesis, University of Nottingham, 2007."},{"key":"101_CR25","doi-asserted-by":"crossref","unstructured":"Atkinson, A., Riani, M. and Cerioli, A., Exploring Multivariate Data with the Forward Search, Springer, 2004.","DOI":"10.1007\/978-0-387-21840-3"},{"key":"101_CR26","doi-asserted-by":"crossref","unstructured":"Barros, C., Basgalupp, P., Carvalho, A. and Alex, A., \u201cA survey of evolutionary algorithms for decision-tree induction,\u201d IEEE Transactions on Systems, Man, and Cybernetics, 42, pp. 291\u2013312, 2011.","DOI":"10.1109\/TSMCC.2011.2157494"},{"key":"101_CR27","doi-asserted-by":"crossref","unstructured":"Greensmith, J. and Aickelin, U., \u201cDendritic cells for syn scan detection,\u201d in Proc. of the Genetic and Evolutionary Computation Conference, ACM, pp. 49\u201356, 2007.","DOI":"10.2139\/ssrn.2831315"},{"key":"101_CR28","doi-asserted-by":"crossref","unstructured":"Musselle, C., \u201cInsights into the antigen sampling component of the dendritic cell algorithm,\u201d Proc. of the 9th International Conference on Artificial Immune Systems, ICARIS\u20192010, Springer, pp. 88\u2013101, 2010.","DOI":"10.1007\/978-3-642-14547-6_8"},{"key":"101_CR29","unstructured":"Gu, F., Greensmith, J. and Aickelin, U., \u201cIntegrating real-time analysis with the dendritic cell algorithm through segmentation,\u201d in GECCO, pp. 1203\u20131210, 2009."},{"key":"101_CR30","unstructured":"Fu, H. and Li, G., \u201cDesign of an immune-inspired danger theory model based on fuzzy set,\u201d Proc. of International Symposium on Computational Intelligence and Design, 2008, IEEE, pp. 133\u2013136, 2008."},{"key":"101_CR31","unstructured":"Fu, H. and Zhang, C., \u201cDesign of a danger signal detecting model based on fuzzy-set,\u201d Proc. of 5th International Conference on Wireless communications, networking and mobile computing, 2009, IEEE, pp. 4566\u20134568, 2009."},{"key":"101_CR32","doi-asserted-by":"crossref","unstructured":"Amaral, M., \u201cFault detection in analog circuits using a fuzzy dendritic cell algorithm,\u201d in ICARIS, pp. 18\u201321, 2011.","DOI":"10.1007\/978-3-642-22371-6_26"},{"key":"101_CR33","unstructured":"Amaral, M., \u201cFinding danger using fuzzy dendritic cells,\u201d in Proc. Workshop on Hybrid Intelligent Models and Applications, pp. 21\u201327, 2011."},{"key":"101_CR34","doi-asserted-by":"crossref","unstructured":"Chelly, Z. and Elouedi, Z., \u201cFdcm: A fuzzy dendritic cell method,\u201d in Proc. of the 9th International Conference of Artificial Immune Systems, Springer, pp. 102\u2013115, 2010.","DOI":"10.1007\/978-3-642-14547-6_9"},{"key":"101_CR35","doi-asserted-by":"crossref","unstructured":"Bezdek, C., Pattern Recognition with Fuzzy Objective Function Algorithms, Plenum Press, 1981.","DOI":"10.1007\/978-1-4757-0450-1"},{"key":"101_CR36","doi-asserted-by":"crossref","unstructured":"Gustafson, D. and Kessel, W., \u201cFuzzy clustering with a fuzzy covariance matrix,\u201d in Proc. of the IEEE Conference on Decision and Control, IEEE, pp. 761\u2013766, 1979.","DOI":"10.1109\/CDC.1978.268028"},{"key":"101_CR37","doi-asserted-by":"crossref","unstructured":"Dave, R., \u201cFuzzy shell clustering and application to circle detection in digital images,\u201d International Journal of General Systems, 16, pp. 343\u2013355, 1990.","DOI":"10.1080\/03081079008935087"},{"key":"101_CR38","unstructured":"Dubes, R. and Jain, A., Algorithms for clustering data, Prentice-Hall, 1998."},{"key":"101_CR39","unstructured":"Ross, T. J., Fuzzy Logic with Engineering Applications, John Wiley & Sons, 3rd edition, 2004."},{"key":"101_CR40","doi-asserted-by":"crossref","unstructured":"Krishnapuram, R., Nasraoui, O. and Frigui, H., \u201cFuzzy and possibilistic shell clustering algorithms and their application to boundary detection and surface approximation,\u201d IEEE Transactions on Neural Networks, 3, pp. 29\u201360, 1995.","DOI":"10.1109\/91.366570"},{"key":"101_CR41","unstructured":"Dave, R., \u201cRobust fuzzy clustering algorithms,\u201d in Proc. of the 2nd IEEE International Conference on Fuzzy Systems, IEEE, pp. 1281\u20131286, 1993."},{"key":"101_CR42","doi-asserted-by":"crossref","unstructured":"Mamdani, H. and Assilian, S., \u201cAn experiment in linguistic synthesis with a fuzzy logic controller,\u201d International Journal of Man-Machine Studies, 7, pp. 1\u201313, 1975.","DOI":"10.1016\/S0020-7373(75)80002-2"},{"key":"101_CR43","doi-asserted-by":"crossref","unstructured":"Broekhoven, E. and Baets, B., \u201cFast and accurate center of gravity defuzzification of fuzzy system outputs defined on trapezoidal fuzzy partitions,\u201d Fuzzy Sets and Systems, 157, pp. 904\u2013918, 2006.","DOI":"10.1016\/j.fss.2005.11.005"},{"key":"101_CR44","doi-asserted-by":"crossref","first-page":"370","DOI":"10.1109\/91.413225","volume":"3","author":"R. Nikhil","year":"1995","unstructured":"Nikhil R., Bezdek C., James C.: \u201cOn cluster validity for the fuzzy c-means model\u201d. IEEE Transactions on Fuzzy Systems 3, 370\u2013379 (1995)","journal-title":"IEEE Transactions on Fuzzy Systems"},{"key":"101_CR45","doi-asserted-by":"crossref","unstructured":"Xie, X. L. and Beni, G. A., \u201cValidity measure for fuzzy clustering,\u201d IEEE Transactions on Pattern Analysis and Machine Intelligence, 3, pp. 841\u2013846, 1991.","DOI":"10.1109\/34.85677"},{"key":"101_CR46","unstructured":"MIT Lincoln Lab Information System Technology Group, The 1998 intrusion detection off-line evaluation plan, http:\/\/www.ll.mit.edu\/IST\/ideval\/data\/1998\/ ."},{"key":"101_CR47","doi-asserted-by":"crossref","unstructured":"Kayacik, N., amd Zincir-Heywood, G. and Heywood, M., \u201cSelecting features for intrusion detection: A feature relevance analysis on kdd 99 intrusion detection datasets,\u201d in Third Annual Conference on Privacy, Security and Trust (PST), 2005.","DOI":"10.4018\/978-1-59140-561-0.ch071"},{"key":"101_CR48","unstructured":"Quinlan, J., C4.5: Programs for machine learning, Morgan Kaufmann, 1993."},{"key":"101_CR49","unstructured":"John, G. and Langley, P., \u201cEstimating continuous distributions in bayesian classifiers,\u201d in Proc. of the Eleventh Conference on Uncertainty in Artificial Intelligence, pp. 338\u2013345, 1995."},{"key":"101_CR50","unstructured":"Kohavi, R., \u201cScaling up the accuracy of naive-bayes classifiers: A decision-tree hybrid,\u201d in Proc. of the Second International Conference on Knowledge Discovery and Data Mining, 1996."},{"key":"101_CR51","unstructured":"Breiman, L., \u201cRandom forests,\u201d in Random Forests, p. 532, 2001."},{"key":"101_CR52","doi-asserted-by":"crossref","unstructured":"Aldous, D., \u201cThe continuum random tree,\u201d in The Annals of Probability, p. 128, 1991.","DOI":"10.1214\/aop\/1176990534"},{"key":"101_CR53","doi-asserted-by":"crossref","unstructured":"Ruck, D., Rogers, S., Kabrisky, M., Oxley, M. and Suter, B., \u201cThe multilayer perceptron as an approximation to a bayes optimaldiscriminant function,\u201d in IEEE Transactions on Neural Networks, pp. 296\u2013298, 1990.","DOI":"10.1109\/72.80266"},{"key":"101_CR54","unstructured":"Chang, C. and Lin, C., \u201cLibsvm: a library for support vector machines,\u201d in Software available at http:\/\/www.csie.ntu.edu.tw\/cjlin\/libsvm ."}],"container-title":["New Generation Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00354-015-0101-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00354-015-0101-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00354-015-0101-1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,27]],"date-time":"2022-04-27T18:10:30Z","timestamp":1651083030000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00354-015-0101-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,1]]},"references-count":54,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2015,1]]}},"alternative-id":["101"],"URL":"https:\/\/doi.org\/10.1007\/s00354-015-0101-1","relation":{},"ISSN":["0288-3635","1882-7055"],"issn-type":[{"value":"0288-3635","type":"print"},{"value":"1882-7055","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,1]]}}}