A Randomized Real-Valued Negative Selection Algorithm
暂无分享,去创建一个
[1] Dipankar Dasgupta,et al. Neuro-Immune and Self-Organizing Map Approaches to Anomaly Detection: A Comparison , 2002 .
[2] Alan S. Perelson,et al. Self-nonself discrimination in a computer , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.
[3] Charles E. Clark,et al. Monte Carlo , 2006 .
[4] Ronald L. Wasserstein,et al. Monte Carlo: Concepts, Algorithms, and Applications , 1997 .
[5] Tim Hesterberg,et al. Monte Carlo Strategies in Scientific Computing , 2002, Technometrics.
[6] N. Metropolis,et al. Equation of State Calculations by Fast Computing Machines , 1953, Resonance.
[7] Gregg H. Gunsch,et al. An artificial immune system architecture for computer security applications , 2002, IEEE Trans. Evol. Comput..
[8] P. Helman,et al. A formal framework for positive and negative detection schemes , 2004, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).
[9] Fabio A. González,et al. The Effect of Binary Matching Rules in Negative Selection , 2003, GECCO.
[10] T. Teichmann,et al. An introduction to mathematical statistics , 1960 .
[11] David J. C. Mackay,et al. Introduction to Monte Carlo Methods , 1998, Learning in Graphical Models.
[12] C. D. Gelatt,et al. Optimization by Simulated Annealing , 1983, Science.
[13] Emile H. L. Aarts,et al. Simulated Annealing: Theory and Applications , 1987, Mathematics and Its Applications.
[14] D. Dasgupta,et al. Combining negative selection and classification techniques for anomaly detection , 2002, Proceedings of the 2002 Congress on Evolutionary Computation. CEC'02 (Cat. No.02TH8600).
[15] Leandro Nunes de Castro,et al. A Pruning Self-Organizing Algorithm to Select Centers of Radial Basis Function Neural Networks , 2001 .
[16] M. R. Strayer,et al. Computational Science Education Project , 1993, Proceedings of IEEE Frontiers in Education Conference - FIE '93.
[17] Leandro Nunes de Castro,et al. Artificial Immune Systems: A New Computational Approach , 2002 .
[18] Paul Helman,et al. An immunological approach to change detection: algorithms, analysis and implications , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[19] Julian F. Miller,et al. Genetic and Evolutionary Computation — GECCO 2003 , 2003, Lecture Notes in Computer Science.