Estimating the detector coverage in a negative selection algorithm
暂无分享,去创建一个
[1] Fabio A. González,et al. A Randomized Real-Valued Negative Selection Algorithm , 2003, ICARIS.
[2] Alan S. Perelson,et al. Self-nonself discrimination in a computer , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.
[3] Fabio A. González,et al. An immunity-based technique to characterize intrusions in computer networks , 2002, IEEE Trans. Evol. Comput..
[4] Weber Je,et al. Statistical analysis: Applications to business and economics , 1980 .
[5] M. Kendall. Probability and Statistical Inference , 1956, Nature.
[6] Paul Helman,et al. On-line Negative Databases , 2005, Int. J. Unconv. Comput..
[7] Rogério de Lemos,et al. Negative Selection: How to Generate Detectors , 2002 .
[8] Zhou Ji,et al. Real-Valued Negative Selection Algorithm with Variable-Sized Detectors , 2004, GECCO.
[9] Felipe Cucker,et al. On the mathematical foundations of learning , 2001 .
[10] Jonathan Timmis,et al. Artificial immune systems - a new computational intelligence paradigm , 2002 .
[11] Alex Alves Freitas,et al. Revisiting the Foundations of Artificial Immune Systems: A Problem-Oriented Perspective , 2003, ICARIS.
[12] Paul Helman,et al. On-line Negative Databases , 2004, Int. J. Unconv. Comput..
[13] B. Everitt,et al. Statistical methods for rates and proportions , 1973 .
[14] P. J. Green,et al. Probability and Statistical Inference , 1978 .
[15] Paul Helman,et al. An immunological approach to change detection: algorithms, analysis and implications , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[16] Jonathan Timmis,et al. Artificial Immune Systems: A New Computational Intelligence Approach , 2003 .
[17] S T Lhu,et al. Discriminative power of the receptors activated by k-contiguous bits rule , 2000 .