DENSA: An effective negative selection algorithm with flexible boundaries for self-space and dynamic number of detectors
暂无分享,去创建一个
Mario Pavone | Alireza Osareh | Sajjad Fouladvand | Bita Shadgar | Siyamack Sharafi | A. Osareh | B. Shadgar | M. Pavone | S. Fouladvand | S. Sharafi
[1] Adrian E. Raftery,et al. How Many Clusters? Which Clustering Method? Answers Via Model-Based Cluster Analysis , 1998, Comput. J..
[2] Jianbin Hu,et al. Real-Valued Negative Selection Algorithm with Variable-Sized Self Radius , 2012, ICICA.
[3] Wenjian Luo,et al. A Heuristic Detector Generation Algorithm for Negative Selection Algorithm with Hamming Distance Partial Matching Rule , 2006, ICARIS.
[4] Zhou Ji,et al. Negative selection algorithms: from the thymus to v-detector , 2006 .
[5] Vincenzo Cutello,et al. An immune algorithm with stochastic aging and kullback entropy for the chromatic number problem , 2007, J. Comb. Optim..
[6] Uwe Aickelin,et al. The Danger Theory and Its Application to Artificial Immune Systems , 2008, ArXiv.
[7] Vanda Vitali. Formal methods for the analysis of archaeological data: data analysis vs expert systems , 2009 .
[8] Slawomir T. Wierzchon,et al. Hybrid Negative Selection Approach for Anomaly Detection , 2012, CISIM.
[9] Vincenzo Cutello,et al. On discrete models and immunological algorithms for protein structure prediction , 2011, Natural Computing.
[10] Alireza Osareh,et al. Automated identification of diabetic retinal exudates and the optic disc , 2004 .
[11] Josep Puyol-Gruart. Computer Science , Artificial Intelligence and Archaeology , 2002 .
[12] Vincenzo Cutello,et al. An Immune Algorithm for Protein Structure Prediction on Lattice Models , 2007, IEEE Transactions on Evolutionary Computation.
[13] Slawomir T. Wierzchon,et al. Generating Optimal Repertoire of Antibody Strings in an Artificial Immune System , 2000, Intelligent Information Systems.
[14] Wenjian Luo,et al. PTS-RNSA: A Novel Detector Generation Algorithm for Real-Valued Negative Selection Algorithm , 2009, 2009 International Joint Conference on Bioinformatics, Systems Biology and Intelligent Computing.
[15] D. Dasgupta. Artificial Immune Systems and Their Applications , 1998, Springer Berlin Heidelberg.
[16] Richard E. Neapolitan,et al. Artificial Intelligence: With an Introduction to Machine Learning, Second Edition , 2018 .
[17] Julian D. Richards,et al. Recent Trends in Computer Applications in Archaeology , 1998 .
[18] Julian D. Richards. New tools from mathematical archaeology , 1992 .
[19] Honghua Dai,et al. Constructing Detectors in Schema Complementary Space for Anomaly Detection , 2004, GECCO.
[20] Celso C. Ribeiro,et al. TTT plots: a perl program to create time-to-target plots , 2007, Optim. Lett..
[21] D. Dasgupta,et al. Combining negative selection and classification techniques for anomaly detection , 2002, Proceedings of the 2002 Congress on Evolutionary Computation. CEC'02 (Cat. No.02TH8600).
[22] Jon Timmis,et al. An immune network inspired evolutionary algorithm for the diagnosis of Parkinson's disease , 2008, Biosyst..
[23] Andries Petrus Engelbrecht,et al. Application of the feature-detection rule to the Negative Selection Algorithm , 2013, Expert Syst. Appl..
[24] Mauricio G. C. Resende,et al. A Greedy Randomized Adaptive Search Procedure for Maximum Independent Set , 1994, Oper. Res..
[25] Ethem Alpaydin,et al. Introduction to machine learning , 2004, Adaptive computation and machine learning.
[26] Celso C. Ribeiro,et al. Probability Distribution of Solution Time in GRASP: An Experimental Investigation , 2002, J. Heuristics.
[27] Alireza Osareh,et al. Distribution estimation based negative selection algorithm (DENSA) , 2015, 2015 International Workshop on Artificial Immune Systems (AIS).
[28] M Pavone,et al. An Immunological Algorithm for Combinatorial Optimization: the FuelDistribution Problem as Case Study , 2015 .
[29] Fabio A. González,et al. An immuno-fuzzy approach to anomaly detection , 2003, The 12th IEEE International Conference on Fuzzy Systems, 2003. FUZZ '03..
[30] Wenjian Luo,et al. On the self representation based on the adaptive self radius , 2011, The Fourth International Workshop on Advanced Computational Intelligence.
[31] L. Deravignone,et al. Artificial Neural Networks in archaeology , 2006 .
[32] Giuseppe Nicosia,et al. Clonal selection: an immunological algorithm for global optimization over continuous spaces , 2012, J. Glob. Optim..
[33] Uwe Aickelin,et al. Danger Theory: The Link between AIS and IDS? , 2003, ICARIS.
[34] Rogério de Lemos,et al. Negative Selection: How to Generate Detectors , 2002 .
[35] Stephanie Forrest,et al. Coverage and Generalization in an Artificial Immune System , 2002, GECCO.
[36] Paul Helman,et al. An immunological approach to change detection: algorithms, analysis and implications , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[37] Jie Zhang,et al. EvoSeedRNSAII: An improved evolutionary algorithm for generating detectors in the real-valued Negative Selection Algorithms , 2014, Appl. Soft Comput..
[38] Ian T. Nabney,et al. Netlab: Algorithms for Pattern Recognition , 2002 .
[39] Alan S. Perelson,et al. Self-nonself discrimination in a computer , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.
[40] Claudia Eckert,et al. A Comparative Study of Real-Valued Negative Selection to Statistical Anomaly Detection Techniques , 2005, ICARIS.
[41] Juan A. Barceló. Computational Intelligence in Archaeology. A State-of-the Art. , 2009 .
[42] Ali A. Ghorbani,et al. A detailed analysis of the KDD CUP 99 data set , 2009, 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications.
[43] Jian Pei,et al. Data Mining: Concepts and Techniques, 3rd edition , 2006 .
[44] Fabio A. González,et al. A Randomized Real-Valued Negative Selection Algorithm , 2003, ICARIS.
[45] Julie Greensmith,et al. Immune system approaches to intrusion detection – a review , 2004, Natural Computing.
[46] Vincenzo Cutello,et al. Protein multiple sequence alignment by hybrid bio-inspired algorithms , 2011, Nucleic acids research.
[47] Vincenzo Cutello,et al. Immune Algorithm Versus Differential Evolution: A Comparative Case Study Using High Dimensional Function Optimization , 2007, ICANNGA.
[48] James Cannady,et al. A self-adaptive negative selection approach for anomaly detection , 2004, Proceedings of the 2004 Congress on Evolutionary Computation (IEEE Cat. No.04TH8753).