Fuzzy Continuous Petri Net-Based Approach for Modeling Helper T Cell Differentiation

Helper T(Th) cells regulate immune response by producing various kinds of cytokines in response to antigen stimulation. The regulatory functions of Th cells are promoted by their differentiation into two distinct subsets, Th1 and Th2 cells. Th1 cells are involved in inducing cellular immune response by activating cytotoxic T cells. Th2 cells trigger B cells to produce antibodies, protective proteins used by the immune system to identify and neutralize foreign substances. Because cellular and humoral immune responses have quite different roles in protecting the host from foreign substances, Th cell differentiation is a crucial event in the immune response. The destiny of a naive Th cell is mainly controlled by cytokines such as IL-4, IL-12, and IFN-γ. To understand the mechanism of Th cell differentiation, many mathematical models have been proposed. One of the most difficult problems in mathematical modeling is to find appropriate kinetic parameters needed to complete a model. However, it is relatively easy to get qualitative or linguistic knowledge of a model dynamics. To incorporate such knowledge into a model, we propose a novel approach, fuzzy continuous Petri nets extending traditional continuous Petri net by adding new types of places and transitions called fuzzy places and fuzzy transitions. This extension makes it possible to perform fuzzy inference with fuzzy places and fuzzy transitions acting as kinetic parameters and fuzzy inference systems between input and output places, respectively.

[1]  Vincent Rodin,et al.  Simulation of thrombin generation during plasmatic coagulation and primary hemostasis , 2000, Smc 2000 conference proceedings. 2000 ieee international conference on systems, man and cybernetics. 'cybernetics evolving to systems, humans, organizations, and their complex interactions' (cat. no.0.

[2]  David H. Ackley,et al.  Building diverse computer systems , 1997, Proceedings. The Sixth Workshop on Hot Topics in Operating Systems (Cat. No.97TB100133).

[3]  Leandro Nunes de Castro,et al.  A Neuro-Immune Network for Solving the Traveling Salesman Problem , 2006, The 2006 IEEE International Joint Conference on Neural Network Proceedings.

[4]  Jonathan Timmis,et al.  The Immune System in Pieces: Computational Lessons from Degeneracy in the Immune System , 2007, 2007 IEEE Symposium on Foundations of Computational Intelligence.

[5]  Andy M. Tyrrell,et al.  A hardware immune system for benchmark state machine error detection , 2002, Proceedings of the 2002 Congress on Evolutionary Computation. CEC'02 (Cat. No.02TH8600).

[6]  Fabio A. González,et al.  An immunity-based technique to characterize intrusions in computer networks , 2002, IEEE Trans. Evol. Comput..

[7]  Toshio Fukuda,et al.  Micro autonomous robotic system and biologically inspired immune swarm strategy as a multi agent robotic system , 1995, Proceedings of 1995 IEEE International Conference on Robotics and Automation.

[8]  Heder S. Bernardino,et al.  Constraint Handling in Genetic Algorithms via Artificial Immune Systems , 2006 .

[9]  Fernando Niño,et al.  Keyword extraction using an artificial immune system , 2007, GECCO '07.

[10]  D. Dasgupta,et al.  A formal model of an artificial immune system. , 2000, Bio Systems.

[11]  Uwe Aickelin,et al.  Cooperative Automated Worm Response and Detection ImmuNe ALgorithm(CARDINAL) Inspired by T-Cell Immunity and Tolerance , 2005, ICARIS.

[12]  D. Wong,et al.  Negative Selection Algorithm for Aircraft Fault Detection , 2004, ICARIS.

[13]  Mark James Neal,et al.  Meta-stable Memory in an Artificial Immune Network , 2003, ICARIS.

[14]  Jonathan Timmis,et al.  A resource limited artificial immune system for data analysis , 2001, Knowl. Based Syst..

[15]  D. Dasgupta,et al.  Combining negative selection and classification techniques for anomaly detection , 2002, Proceedings of the 2002 Congress on Evolutionary Computation. CEC'02 (Cat. No.02TH8600).

[16]  Leandro Nunes de Castro,et al.  ARTIFICIAL IMMUNE SYSTEMS: PART II - A SURVEY OF APPLICATIONS , 2000 .

[17]  S. Constant,et al.  Induction of Th1 and Th2 CD4+ T cell responses: the alternative approaches. , 1997, Annual review of immunology.

[18]  Jie Zhao,et al.  FICSEM: a learning method from one-case fitted in complex adaptive system , 2002, Proceedings. International Conference on Machine Learning and Cybernetics.

[19]  F T Vertosick,et al.  Immune network theory: a role for parallel distributed processing? , 1989, Immunology.

[20]  A. Perelson,et al.  Size and connectivity of the idiotypic network are independent of the discreteness of the affinity distribution. , 1996, Journal of theoretical biology.

[21]  Fabio A. González,et al.  An Novel Artificial Immune System Approach to Robust Data Mining , 2002, GECCO Late Breaking Papers.

[22]  A. Coutinho,et al.  A model of the immune network with B-T cell co-operation. I--Prototypical structures and dynamics. , 1996, Journal of theoretical biology.

[23]  Kenneth A. De Jong,et al.  The Coevolution of Antibodies for Concept Learning , 1998, PPSN.

[24]  Susan Stepney,et al.  Artificial Immune Systems and the Grand Challenge for Non-classical Computation , 2003, ICARIS.

[25]  A. Coutinho,et al.  A model of the immune network with B-T cell co-operation. II--The simulation of ontogenesis. , 1996, Journal of theoretical biology.

[26]  Marco A. Janssen,et al.  An application of immunocomputing to the evolution of rules for ecosystem management , 2002, Proceedings of the 2002 Congress on Evolutionary Computation. CEC'02 (Cat. No.02TH8600).

[27]  Alan S. Perelson,et al.  The immune system, adaptation, and machine learning , 1986 .

[28]  John B. Shoven,et al.  I , Edinburgh Medical and Surgical Journal.

[29]  G. Oster,et al.  Theoretical studies of clonal selection: minimal antibody repertoire size and reliability of self-non-self discrimination. , 1979, Journal of theoretical biology.

[30]  Uwe Aickelin,et al.  A Recommender System based on Idiotypic Artificial Immune Networks , 2005, J. Math. Model. Algorithms.

[31]  Claudia Eckert,et al.  The Link between r-contiguous Detectors and k-CNF Satisfiability , 2006, 2006 IEEE International Conference on Evolutionary Computation.

[32]  Doheon Lee,et al.  Mathematical Modeling of Immune Suppression , 2005, ICARIS.

[33]  A S Perelson,et al.  Modeling T cell-antigen presenting cell interactions. , 1993, Journal of theoretical biology.

[34]  Dipankar Dasgupta,et al.  The Promise and Challenges of Artificial Immune System Based Web Usage Mining : Preliminary Results , 2002 .

[35]  J. Hemmen,et al.  Cytokine-modulated regulation of helper T cell populations. , 2000, Journal of theoretical biology.

[36]  Alex Alves Freitas,et al.  Induction of fuzzy rules with artificial immune systems in acgh based er status breast cancer characterization , 2007, GECCO '07.

[37]  Stephanie Forrest,et al.  Modeling Influenza Viral Dynamics in Tissue , 2006, ICARIS.

[38]  Yoshiki Uchikawa,et al.  Immunoid: an architecture for behavior arbitration based on the immune networks , 1996, Proceedings of IEEE/RSJ International Conference on Intelligent Robots and Systems. IROS '96.

[39]  Guan-Chun Luh,et al.  Reactive Immune Network Based Mobile Robot Navigation , 2004, ICARIS.

[40]  Anil Somayaji Immunology, diversity, and homeostasis: The past and future of biologically inspired computer defenses , 2007, Inf. Secur. Tech. Rep..

[41]  Julie Greensmith,et al.  Two Ways to Grow Tissue for Artificial Immune Systems , 2005, ICARIS.

[42]  Yoshikazu Yamamoto,et al.  iNet: an extensible framework for simulating immune network , 2000, Smc 2000 conference proceedings. 2000 ieee international conference on systems, man and cybernetics. 'cybernetics evolving to systems, humans, organizations, and their complex interactions' (cat. no.0.

[43]  S. A. Taheri,et al.  Imitating the human immune system capabilities for multi-agent federation formation , 2001, Proceeding of the 2001 IEEE International Symposium on Intelligent Control (ISIC '01) (Cat. No.01CH37206).

[44]  Doheon Lee,et al.  Immune-Based Framework for Exploratory Bio-information Retrieval from the Semantic Web , 2003, ICARIS.

[45]  Tony White,et al.  Increasing the accuracy of a spam-detecting artificial immune system , 2003, The 2003 Congress on Evolutionary Computation, 2003. CEC '03..

[46]  Stephanie Forrest,et al.  A stochastic model of cytotoxic T cell responses. , 2004, Journal of theoretical biology.

[47]  Jon Timmis On Parameter Adjustment of the Immune Inspired Machine Learning Algorithm AINE , 2000 .

[48]  P. Norman,et al.  Immunobiology: The immune system in health and disease , 1995 .

[49]  Hajime Igarashi,et al.  An Immune-based Algorithm for Topology Optimization , 2006, 2006 IEEE International Conference on Evolutionary Computation.

[50]  Jonathan Timmis,et al.  Biomolecular Immune-Computer: Theoretical Basis and Experimental Simulator , 2005, ICARIS.

[51]  L. Segel,et al.  Immunology Viewed as the Study of an Autonomous Decentralized System , 1998 .

[52]  Emma Hart,et al.  Analysis of a Growth Model for Idiotypic Networks , 2006, ICARIS.

[53]  Balasubramaniam Natarajan,et al.  A multi-objective algorithm for DS-CDMA code design based on the clonal selection principle , 2005, GECCO '05.

[54]  Peter Ross,et al.  Producing robust schedules via an artificial immune system , 1998, 1998 IEEE International Conference on Evolutionary Computation Proceedings. IEEE World Congress on Computational Intelligence (Cat. No.98TH8360).

[55]  F. Vargas,et al.  Summarizing a new approach to design speech recognition systems: a reliable noise-immune HW-SW version , 2001, Symposium on Integrated Circuits and Systems Design.

[56]  J. C. Tay,et al.  Applying the Clonal Selection Principle to Find Flexible Job-Shop Schedules , 2005, ICARIS.

[57]  Jon Timmis,et al.  Computer Science at Kent Assessing the performance of the resource limited artificial immune system AINE , 2001 .

[58]  Ge Hong,et al.  Immune algorithm , 2002, Proceedings of the 4th World Congress on Intelligent Control and Automation (Cat. No.02EX527).

[59]  Xin Xu,et al.  Immune Algorithm Based Routing Optimization in Fourth-Party Logistics , 2006, 2006 IEEE International Conference on Evolutionary Computation.

[60]  S. Forrest,et al.  Antibody repertoires and pathogen recognition: the role of germline diversity and somatic hypermutation , 1999 .

[61]  José Ricardo Pelaquim Mendes,et al.  Artificial Immune Systems for Classification of Petroleum Well Drilling Operations , 2007, ICARIS.

[62]  Victor A. Skormin,et al.  BASIS: A Biological Approach to System Information Security , 2001, MMM-ACNS.

[63]  T. Fukuda,et al.  Artificial immunity based management system for a semiconductor production line , 1997, 1997 IEEE International Conference on Systems, Man, and Cybernetics. Computational Cybernetics and Simulation.

[64]  Alan S. Perelson,et al.  Th1/Th2 differentiation and cross-regulation , 1999, Bulletin of mathematical biology.

[65]  Tadao Murata,et al.  Petri nets: Properties, analysis and applications , 1989, Proc. IEEE.

[66]  Takeshi Okamoto,et al.  A Distributed Approach against Computer Viruses Inspired by the Immune System , 2000 .

[67]  Stephanie Forrest,et al.  Revisiting LISYS: parameters and normal behavior , 2002, Proceedings of the 2002 Congress on Evolutionary Computation. CEC'02 (Cat. No.02TH8600).

[68]  X. Zhang,et al.  Artificial Innate Immune System: An Instant Defence Layer of Embryonics , 2004, ICARIS.

[69]  Werner Dilger,et al.  Structural Properties of Shape-Spaces , 2006, ICARIS.

[70]  Yangyang Li,et al.  Quantum-Inspired Immune Clonal Algorithm , 2005, ICARIS.

[71]  Ferat Sahin,et al.  AISIMAM – An Artificial immune system based intelligent multi agent model and its application to a mine detection problem , 2002 .

[72]  Werner Dilger,et al.  A dynamic approach to artificial immune systems utilizing neural networks , 2006, GECCO.

[73]  Tim Kovacs,et al.  On the contribution of gene libraries to artificial immune systems , 2005, GECCO '05.

[74]  Yoshiteru Ishida,et al.  Active Diagnosis by Self-Organization: An Approach by The Immune Network Metaphor , 1997, IJCAI.

[75]  Shirley Dex,et al.  JR 旅客販売総合システム(マルス)における運用及び管理について , 1991 .

[76]  Jonathan Timmis,et al.  On the Investigation of Artificial Immune Systems on Imbalanced Data Classification for Power Distribution System Fault Cause Identification , 2006, 2006 IEEE International Conference on Evolutionary Computation.

[77]  Christopher Cheong,et al.  Consumer credit scoring using an artificial immune system algorithm , 2007, 2007 IEEE Congress on Evolutionary Computation.

[78]  Dipankar Dasgupta,et al.  A comparison of negative and positive selection algorithms in novel pattern detection , 2000, Smc 2000 conference proceedings. 2000 ieee international conference on systems, man and cybernetics. 'cybernetics evolving to systems, humans, organizations, and their complex interactions' (cat. no.0.

[79]  Jui-Yu Wu,et al.  Artificial immune system for solving generalized geometric problems: a preliminary results , 2005, GECCO '05.

[80]  Leandro Nunes de Castro,et al.  An Immune and a Gradient-Based Method to Train Multi-Layer Perceptron Neural Networks , 2006, The 2006 IEEE International Joint Conference on Neural Network Proceedings.

[81]  Stephanie Forrest,et al.  A sense of self for Unix processes , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.

[82]  Licheng Jiao,et al.  Clonal operator and antibody clone algorithms , 2002, Proceedings. International Conference on Machine Learning and Cybernetics.

[83]  Dipankar Dasgupta,et al.  Artificial immune systems in industrial applications , 1999, Proceedings of the Second International Conference on Intelligent Processing and Manufacturing of Materials. IPMM'99 (Cat. No.99EX296).

[84]  John E. Hunt,et al.  Learning using an artificial immune system , 1996 .

[85]  Leandro Nunes de Castro,et al.  An Overview of Artificial Immune Systems , 2004 .

[86]  N. K. Jerne,et al.  Idiotypic Networks and Other Preconceived Ideas , 1984, Immunological reviews.

[87]  Hsiu-Sen Chiang,et al.  Internet security: malicious e-mails detection and protection , 2004, Ind. Manag. Data Syst..

[88]  Peter J. Bentley,et al.  Fugue: An Interactive Immersive Audiovisualisation and Artwork Using an Artificial Immune System , 2005, ICARIS.

[89]  Wenjian Luo,et al.  Immune genetic programming based on register-stack structure , 2007, 2007 IEEE Congress on Evolutionary Computation.

[90]  Andrew M. Tyrrell,et al.  Robot error detection using an artificial immune system , 2003, NASA/DoD Conference on Evolvable Hardware, 2003. Proceedings..

[91]  William S. Hortos An artificial immune system for securing mobile ad hoc networks against intrusion attacks , 2003, SPIE Defense + Commercial Sensing.

[92]  Mohd Aizaini Maarof,et al.  Polymorphism and Danger Susceptibility of System Call DASTONs , 2005, ICARIS.

[93]  F. Sallusto,et al.  Kinetics of dendritic cell activation: impact on priming of TH1, TH2 and nonpolarized T cells , 2000, Nature Immunology.

[94]  Yoshiki Uchikawa,et al.  An immunological approach to dynamic behavior control for autonomous mobile robots , 1995, Proceedings 1995 IEEE/RSJ International Conference on Intelligent Robots and Systems. Human Robot Interaction and Cooperative Robots.

[95]  Philippe Collard,et al.  Immune Approaches to Experience Acquisition in Time Dependent Optimization , 2000 .

[96]  Jonathan Timmis,et al.  On Diversity and Artificial Immune Systems: Incorporating a Diversity Operator into aiNet , 2005, WIRN/NAIS.

[97]  Stephanie Forrest,et al.  An immunological model of distributed detection and its application to computer security , 1999 .

[98]  Young-Il Kim,et al.  Complementary Dual Detectors for Effective Classification , 2003, ICARIS.

[99]  Lee A. Segel Some Spatio-Temporal Models in Immunology , 2002, Int. J. Bifurc. Chaos.

[100]  Andrew M. Tyrrell,et al.  Immunotronics: Hardware Fault Tolerance Inspired by the Immune System , 2000, ICES.

[101]  Jonathan Timmis,et al.  Software Vaccination: An Artificial Immune System Approach to Mutation Testing , 2003, ICARIS.

[102]  Fernando José Von Zuben,et al.  Automatic Determination Of Radial Basis Functions: An Immunity-Based Approach , 2001, Int. J. Neural Syst..

[103]  Ron R. Hightower,et al.  The Evolution of Secondary Organization in Immune System Gene Libraries , 1993 .

[104]  Victor A. Skormin,et al.  Pattern recognition by immunocomputing , 2002, Proceedings of the 2002 Congress on Evolutionary Computation. CEC'02 (Cat. No.02TH8600).

[105]  Stephanie Forrest,et al.  Infect Recognize Destroy , 1996 .

[106]  Jonathan Timmis,et al.  Artificial immune systems as a novel soft computing paradigm , 2003, Soft Comput..

[107]  Guan-Chun Luh,et al.  Artificial Immune Regulation (AIR) for Model-Based Fault Diagnosis , 2004, ICARIS.

[108]  Yongsheng Ding,et al.  Fuzzy self-tuning immune feedback controller for tissue hyperthermia , 2000, Ninth IEEE International Conference on Fuzzy Systems. FUZZ- IEEE 2000 (Cat. No.00CH37063).

[109]  Krzysztof Ciesielski,et al.  An Immune Network for Contextual Text Data Clustering , 2006, ICARIS.

[110]  Yiwen Liang,et al.  Self-regulating Method for Model Library Based Artificial Immune Systems , 2005, ICARIS.

[111]  Hongda Liu,et al.  Pipeline defect detection and sizing based on MFL data using immune RBF neural networks , 2007, 2007 IEEE Congress on Evolutionary Computation.

[112]  Ferat Sahin,et al.  Application of artificial immune system based intelligent multi agent model to a mine detection problem , 2002, IEEE International Conference on Systems, Man and Cybernetics.

[113]  Carlos A. Coello Coello,et al.  Multiobjective Optimization Using Ideas from the Clonal Selection Principle , 2003, GECCO.

[114]  Philippe Collard,et al.  Two models of immunization for time dependent optimization , 2000, Smc 2000 conference proceedings. 2000 ieee international conference on systems, man and cybernetics. 'cybernetics evolving to systems, humans, organizations, and their complex interactions' (cat. no.0.

[115]  R. Krohling,et al.  Evolving FPGA-based robot controllers using an evolutionary algorithm , 2002 .

[116]  Américo Tristão Bernardes,et al.  The stable-chaotic transition on cellular automata used to model the immune repertoire , 1995 .

[117]  Yasufumi Takama Visualization of Topic Distribution Based on Immune Network Model , 2003, GECCO.

[118]  Claudia Eckert,et al.  An Investigation of R-Chunk Detector Generation on Higher Alphabets , 2004, GECCO.

[119]  Kazuyuki Mori,et al.  Immune Algorithm with Searching Diversity and its Application to Resource Allocation Problem , 1993 .

[120]  Ray Paton Computing with biological metaphors , 1994 .

[121]  Fernando Niño,et al.  An Immune-based Multilayered Cognitive Model for Autonomous Navigation , 2006, 2006 IEEE International Conference on Evolutionary Computation.

[122]  Wei Gao,et al.  Fast immunized evolutionary programming , 2004, Proceedings of the 2004 Congress on Evolutionary Computation (IEEE Cat. No.04TH8753).

[123]  Hironori Hirata,et al.  An evolutionary optimization based on the immune system and its application to the VLSI floor‐plan design problem , 1998 .

[124]  Jonathan Timmis,et al.  Exploiting Parallelism Inherent in AIRS, an Artificial Immune Classifier , 2004, ICARIS.

[125]  Kemal Polat,et al.  The Medical Applications of Attribute Weighted Artificial Immune System (AWAIS): Diagnosis of Heart and Diabetes Diseases , 2005, ICARIS.

[126]  Jonathan Timmis,et al.  Application Areas of AIS: The Past, The Present and The Future , 2005, ICARIS.

[127]  Akio Ishiguro,et al.  A Gait Acquisition of 6-Legged Walking Robot Using Immune Networks , 1995 .

[128]  Andrew Hone,et al.  Conceptual Frameworks for Artificial Immune Systems , 2005, Int. J. Unconv. Comput..

[129]  Stephanie Forrest,et al.  Lightweight Intrusion Detection for Networked Operating Systems , 1998 .

[130]  Wenjian Luo,et al.  An immune genetic algorithm based on immune regulation , 2002, Proceedings of the 2002 Congress on Evolutionary Computation. CEC'02 (Cat. No.02TH8600).

[131]  Jun Zhu,et al.  Artificial immunity using constraint-based detectors , 2002, Proceedings of the 5th Biannual World Automation Congress.

[132]  A S Perelson,et al.  Using lazy evaluation to simulate realistic-size repertoires in models of the immune system , 1997, Bulletin of mathematical biology.

[133]  N. K. Jerne,et al.  The Generative Grammar of the Immune System , 1993, The EMBO journal.

[134]  Y. Ishida,et al.  An immune algorithm for multiagent: application to adaptive noise neutralization , 1996, Proceedings of IEEE/RSJ International Conference on Intelligent Robots and Systems. IROS '96.

[135]  Peter Ross,et al.  Studies on the Implications of Shape-Space Models for Idiotypic Networks , 2004, ICARIS.

[136]  Mihaela Oprea,et al.  Simulated evolution of antibody gene libraries under pathogen selection , 1998, SMC'98 Conference Proceedings. 1998 IEEE International Conference on Systems, Man, and Cybernetics (Cat. No.98CH36218).

[137]  D. Chowdhury,et al.  A unified model of immune response. II: Continuum approach. , 1993, Journal of theoretical biology.

[138]  Jongsoo Lee,et al.  Constrained genetic search via schema adaptation: An immune network solution , 1996 .

[139]  Peter J. Bentley,et al.  The Human Immune System and Network Intrusion Detection , 1999 .

[140]  F.J. Von Zuben,et al.  Decentralized control system for autonomous navigation based on an evolved artificial immune network , 2002, Proceedings of the 2002 Congress on Evolutionary Computation. CEC'02 (Cat. No.02TH8600).

[141]  Dipankar Dasgupta,et al.  An Immunogenetic Approach to Spectra Recognition , 1999, GECCO.

[142]  Julie Greensmith,et al.  Introducing Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomoly Detection , 2005, ICARIS.

[143]  Dong Hwa Kim Tuning of a PID controller using an artificial immune network model and local fuzzy set , 2001, Proceedings Joint 9th IFSA World Congress and 20th NAFIPS International Conference (Cat. No. 01TH8569).

[144]  Niloy Ganguly,et al.  Developing Efficient Search Algorithms for P2P Networks Using Proliferation and Mutation , 2004, ICARIS.

[145]  Muddassar Farooq,et al.  BeeAIS: Artificial Immune System Security for Nature Inspired, MANET Routing Protocol, BeeAdHoc , 2007, ICARIS.

[146]  Nikolay I. Nikolaev,et al.  Immune Network Dynamics for Inductive Problem Solving , 1998, PPSN.

[147]  Yoshikazu Yamamoto,et al.  The Reflection pattern in the immune system , 1998, OOPSLA 1998.

[148]  Tony White,et al.  Developing an Immunity to Spam , 2003, GECCO.

[149]  Gregg H. Gunsch,et al.  An artificial immune system architecture for computer security applications , 2002, IEEE Trans. Evol. Comput..

[150]  Fernando José Von Zuben,et al.  An Evolutionary Immune Network for Data Clustering , 2000, SBRN.

[151]  H. Abbass,et al.  aiNet : An Artificial Immune Network for Data Analysis , 2022 .

[152]  Norihiko Adachi,et al.  Active noise control by an immune algorithm: adaptation in immune system as an evolution , 1996, Proceedings of IEEE International Conference on Evolutionary Computation.

[153]  P. Smaglik Alternative approaches , 2003, Nature.

[154]  Maoguo Gong,et al.  Solving multiobjective clustering using an immune-inspired algorithm , 2007, 2007 IEEE Congress on Evolutionary Computation.

[155]  Carlos A. Coello Coello,et al.  Use of an Artificial Immune System for Job Shop Scheduling , 2003, ICARIS.

[156]  S T Lhu,et al.  Discriminative power of the receptors activated by k-contiguous bits rule , 2000 .

[157]  Muhammad Zubair Shafiq,et al.  Extended thymus action for reducing false positives in ais based network intrusion detection systems , 2007, GECCO '07.

[158]  Jonathan Timmis,et al.  Assessing the performance of two immune inspired algorithms and a hybrid genetic algorithm for function optimisation , 2004, Proceedings of the 2004 Congress on Evolutionary Computation (IEEE Cat. No.04TH8753).

[159]  Koichi Tanno,et al.  Multiple-valued immune network model and its simulations , 1997, Proceedings 1997 27th International Symposium on Multiple- Valued Logic.

[160]  Fernando José Von Zuben,et al.  Bayesian Learning of Neural Networks by Means of Artificial Immune Systems , 2006, The 2006 IEEE International Joint Conference on Neural Network Proceedings.

[161]  Pascal Bouvry,et al.  Immune anomaly detection enhanced with evolutionary paradigms , 2006, GECCO.

[162]  Dipankar Dasgupta,et al.  An immunogenetic approach in chemical spectrum recognition , 2003 .

[163]  Derek J. Smith,et al.  Applications of bioinformatics and computational biology to influenza surveillance and vaccine strain selection. , 2003, Vaccine.

[164]  G. Parisi A simple model for the immune network. , 1990, Proceedings of the National Academy of Sciences of the United States of America.

[165]  Kazuyuki Mori,et al.  Adaptive scheduling system inspired by immune system , 1998, SMC'98 Conference Proceedings. 1998 IEEE International Conference on Systems, Man, and Cybernetics (Cat. No.98CH36218).

[166]  Emma Hart,et al.  Not All Balls Are Round: An Investigation of Alternative Recognition-Region Shapes , 2005, ICARIS.

[167]  A.M. Tyrell,et al.  Computer know thy self!: a biological way to look at fault-tolerance , 1999, Proceedings 25th EUROMICRO Conference. Informatics: Theory and Practice for the New Millennium.

[168]  Jonathan Timmis,et al.  Comparison of a multi-layered artificial immune system with a kohonen network , 2007, 2007 IEEE Congress on Evolutionary Computation.

[169]  Paulo Licio de Geus,et al.  Adenoids: a hybrid IDS based on the immune system , 2002, Proceedings of the 9th International Conference on Neural Information Processing, 2002. ICONIP '02..

[170]  Yoshiki Uchikawa,et al.  Decentralized Behavior Arbitration Mechanism for Autonomous Mobile Robot Using Immune Network , 1999 .

[171]  Hou-Kuan Huang,et al.  An intrusion detection system based on data mining and immune principles , 2002, Proceedings. International Conference on Machine Learning and Cybernetics.

[172]  Fernando José Von Zuben,et al.  Learning and optimization using the clonal selection principle , 2002, IEEE Trans. Evol. Comput..

[173]  Makoto Tsukiyama,et al.  Immunity-Based Management System for a Semiconductor Production Line* , 1999 .

[174]  Priya Narasimhan,et al.  Providing support for survivable CORBA applications with the Immune system , 1999, Proceedings. 19th IEEE International Conference on Distributed Computing Systems (Cat. No.99CB37003).

[175]  Alan S. Perelson,et al.  Deriving Shape Space Parameters from Immunological Data for a Model of Cross-Reactive Memory , 1997 .

[176]  Leandro Nunes de Castro,et al.  The Clonal Selection Algorithm with Engineering Applications 1 , 2000 .

[177]  Leandro Nunes de Castro,et al.  The immune response of an artificial immune network (aiNet) , 2003, IEEE Congress on Evolutionary Computation.

[178]  André J. Noest,et al.  Pattern formation in B-cell immune networks: domains and dots in shape-space , 1997 .

[179]  Pietro Simone Oliveto,et al.  On the Convergence of Immune Algorithms , 2007, 2007 IEEE Symposium on Foundations of Computational Intelligence.

[180]  Jason Brownlee,et al.  IIDLE: An Immunological Inspired Distributed Learning Environment for Multiple Objective and Hybrid Optimisation , 2006, 2006 IEEE International Conference on Evolutionary Computation.

[181]  Fernando José Von Zuben,et al.  RABNET: a real-valued antibody network for data clustering , 2005, GECCO '05.

[182]  Uwe Aickelin,et al.  Towards a Conceptual Framework for Innate Immunity , 2005, ICARIS.

[183]  L. Segel,et al.  On the role of feedback in promoting conflicting goals of the adaptive immune system. , 1999, Journal of immunology.

[184]  J Timmis,et al.  An artificial immune system for data analysis. , 2000, Bio Systems.

[185]  Jonathan Timmis,et al.  An Investigation on the Compression Quality of aiNet , 2007, 2007 IEEE Symposium on Foundations of Computational Intelligence.

[186]  Paul Helman,et al.  The Crossover Closure and Partial Match Detection , 2003, ICARIS.

[187]  Fernando José Von Zuben,et al.  The construction of a Boolean competitive neural network using ideas from immunology , 2003, Neurocomputing.

[188]  Vincenzo Cutello,et al.  Aligning Multiple Protein Sequences by Hybrid Clonal Selection Algorithm with Insert-Remove-Gaps and BlockShuffling Operators , 2006, ICARIS.

[189]  Jonathan Timmis,et al.  A Comment on Opt-AiNET: An Immune Network Algorithm for Optimisation , 2004, GECCO.

[190]  Simon M. Garrett Parameter-free, adaptive clonal selection , 2004, Proceedings of the 2004 Congress on Evolutionary Computation (IEEE Cat. No.04TH8753).

[191]  Fumio Mizoguchi,et al.  Design of security system based on immune system , 2001, Proceedings Tenth IEEE International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises. WET ICE 2001.

[192]  J. Doyne Farmer,et al.  A Rosetta stone for connectionism , 1990 .

[193]  Abder Koukam,et al.  A middleware for large scale networks inspired by the immune system , 2002, Proceedings 16th International Parallel and Distributed Processing Symposium.

[194]  Walmir M. Caminhas,et al.  Modelling the Control of an Immune Response Through Cytokine Signalling , 2006, ICARIS.

[195]  René David,et al.  A Modelling and Analysis Tool for Discrete Events Systems: Continuous Petri Net , 1998, Perform. Evaluation.

[196]  M. Janssen An Immune System Perspective on Ecosystem Management , 2001 .

[197]  Fabio A. González,et al.  A Scalable Artificial Immune System Model for Dynamic Unsupervised Learning , 2003, GECCO.

[198]  Julie Greensmith,et al.  Immune system approaches to intrusion detection – a review , 2004, Natural Computing.

[199]  Alexander O. Tarakanov,et al.  Immunocomputing for Bioarrays , 2002 .

[200]  Steven A. Hofmeyr,et al.  Intrusion Detection via System Call Traces , 1997, IEEE Softw..

[201]  A Coutinho,et al.  The self-nonself discrimination and the nature and acquisition of the antibody repertoire. , 1980, Annales d'immunologie.

[202]  Toshio Fukuda,et al.  The role of virus infection in virus-evolutionary genetic algorithm , 1996, Proceedings of IEEE International Conference on Evolutionary Computation.

[203]  Barak A. Pearlmutter,et al.  Detecting intrusions using system calls: alternative data models , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).

[204]  Fernando José Von Zuben,et al.  Immune Learning Classifier Networks: Evolving Nodes and Connections , 2006, 2006 IEEE International Conference on Evolutionary Computation.

[205]  Hongbin Dong,et al.  A chromosome-based evaluation model for computer defense immune systems , 2003, The 2003 Congress on Evolutionary Computation, 2003. CEC '03..

[206]  Jonathan Timmis,et al.  A Markov Chain Model of the B-Cell Algorithm , 2005, ICARIS.

[207]  Simon M. Garrett,et al.  Modelling Immune Memory for Prediction and Computation , 2004, ICARIS.

[208]  Richard Wheeler,et al.  The Effect of Antibody Morphology on Non-self Detection , 2003, ICARIS.

[209]  Yoshiki Uchikawa,et al.  Emergent construction of a behavior arbitration mechanism based on the immune system , 1997, Adv. Robotics.

[210]  Zhou Ji,et al.  Analysis of Dental Images using Artificial Immune Systems , 2006, 2006 IEEE International Conference on Evolutionary Computation.

[211]  Leandro Nunes de Castro,et al.  Bioinformatics Data Analysis Using an Artificial Immune Network , 2003, ICARIS.

[212]  Yoichi Sugita,et al.  Distributed diagnosis system combining the immune network and learning vector quantization , 1995, Proceedings of IECON '95 - 21st Annual Conference on IEEE Industrial Electronics.

[213]  Yoshiki Uchikawa,et al.  Gait control of hexapod walking robots using mutual-coupled immune networks , 1995, Adv. Robotics.

[214]  Licheng Jiao,et al.  A novel genetic algorithm based on immunity , 2000, IEEE Trans. Syst. Man Cybern. Part A.

[215]  D E N N I S L C H A O,et al.  Modelling the impact of antigen kinetics on T-cell activation and response , 2003 .

[216]  Mark Burgess Evaluating cfengine’s immunity model of site maintenance , 2007 .

[217]  Vincenzo Cutello,et al.  Clonal Selection Algorithms: A Comparative Case Study Using Effective Mutation Potentials , 2005, ICARIS.

[218]  Martin Meier-Schellersheim Understanding information processing in the immune system; computer modeling and simulations , 2002, 2002 IEEE International Conference on Acoustics, Speech, and Signal Processing.

[219]  Huang Houkuan,et al.  An evolving intrusion detection system based on natural immune system , 2002, 2002 IEEE Region 10 Conference on Computers, Communications, Control and Power Engineering. TENCOM '02. Proceedings..

[220]  Ismail Musirin,et al.  Artificial Immune-Based Optimization Technique for Solving Economic Dispatch in Power System , 2005, WIRN/NAIS.

[221]  Peter Ross,et al.  Exploiting the Analogy between the Immune System and Sparse Distributed Memories , 2003, Genetic Programming and Evolvable Machines.

[222]  Liu Di,et al.  Application of immunological memory to the color classification of tiles , 2003, The 2003 Congress on Evolutionary Computation, 2003. CEC '03..

[223]  Fernando Niño,et al.  A Framework for Evolving Multi-Shaped Detectors in Negative Selection , 2007, 2007 IEEE Symposium on Foundations of Computational Intelligence.

[224]  Claudia Eckert,et al.  A Comparative Study of Real-Valued Negative Selection to Statistical Anomaly Detection Techniques , 2005, ICARIS.

[225]  Yoshiki Uchikawa,et al.  Dynamic behavior arbitration of autonomous mobile robots using immune networks , 1995, Proceedings of 1995 IEEE International Conference on Evolutionary Computation.

[226]  Werner Dilger,et al.  Controlling the Heating System of an Intelligent Home with an Artificial Immune System , 2006, ICARIS.

[227]  Henry Y. K. Lau,et al.  Immunologic Responses Manipulation of AIS Agents , 2004, ICARIS.

[228]  Fabio Freschi,et al.  Hybrid method coupling AIS and zeroth order deterministic search , 2005 .

[229]  Lei Wang,et al.  An evolutionary algorithm with population immunity and its application on autonomous robot control , 2003, The 2003 Congress on Evolutionary Computation, 2003. CEC '03..

[230]  Jongsoo Lee,et al.  GA BASED SIMULATION OF IMMUNE NETWORKS APPLICATIONS IN STRUCTURAL OPTIMIZATION , 1997 .

[231]  Richard E. Overill,et al.  Design of an artificial immune system as a novel anomaly detector for combating financial fraud in the retail sector , 2003, The 2003 Congress on Evolutionary Computation, 2003. CEC '03..

[232]  James H. Graham,et al.  Computer System Security Threat Evaluation Based Upon Artificial Immunity Model and Fuzzy Logic , 2005, 2005 IEEE International Conference on Systems, Man and Cybernetics.

[233]  Fumihito Arai,et al.  Control of the distributed autonomous robotic system based on the biologically inspired immunological architecture , 1997, Proceedings of International Conference on Robotics and Automation.

[234]  Alan S. Perelson,et al.  Some design principles for immune system recognition , 1999, Complex..

[235]  Henry Y. K. Lau,et al.  An Immuno Control Framework for Decentralized Mechatronic Control , 2004, Int. J. Unconv. Comput..

[236]  Essential Immunology , 1981 .

[237]  Fernando Esponda Negative Surveys , 2006 .

[238]  Jon Timmis Visualising Artificial Immune Networks , 2000 .

[239]  Surya P. N. Singh,et al.  Immunology-directed methods for distributed robotics: a novel immunity-based architecture for robust control and coordination , 2002, SPIE Optics East.

[240]  Susan Stepney,et al.  A Generic Framework for Population-Based Algorithms, Implemented on Multiple FPGAs , 2005, ICARIS.

[241]  T. Kepler,et al.  Somatic hypermutation in B cells: an optimal control treatment. , 1993, Journal of theoretical biology.

[242]  Xingquan Zuo Robust scheduling method based on workflow simulation model and biological immune principle , 2007, GECCO '07.

[243]  Hugues Bersini,et al.  Immune Idiotypic Network , 1996 .

[244]  Cheng Shiduan,et al.  An immunity-based model for network intrusion detection , 2001, 2001 International Conferences on Info-Tech and Info-Net. Proceedings (Cat. No.01EX479).

[245]  K. KrishnaKumar,et al.  Immunized neurocontrol-concepts and initial results , 1992, [Proceedings] COGANN-92: International Workshop on Combinations of Genetic Algorithms and Neural Networks.

[246]  Lei Wang,et al.  A framework of AIS based pattern classification and matching for engineering creative design , 2002, Proceedings. International Conference on Machine Learning and Cybernetics.

[247]  Henry Y. K. Lau,et al.  An AIS-Based Dynamic Routing (AISDR) Framework , 2005, ICARIS.

[248]  Peter Ross,et al.  An Immune System Approach to Scheduling in Changing Environments , 1999, GECCO.

[249]  Stephanie Forrest,et al.  How the immune system generates diversity: pathogen space coverage with random and evolved antibody libraries , 1999 .

[250]  Dipankar Dasgupta,et al.  Immuno-inspired autonomic system for cyber defense , 2007, Inf. Secur. Tech. Rep..

[251]  P. Bentley,et al.  A Model of Gene Library Evolution in the Dynamic Cl onal Selection Algorithm , 2002 .

[252]  Fabio A. González,et al.  Anomaly Detection Using Real-Valued Negative Selection , 2003, Genetic Programming and Evolvable Machines.

[253]  Chien-Feng Huang,et al.  Using an Immune System Model to Explore Mate Selection in Genetic Algorithms , 2003, GECCO.

[254]  Jonathan Timmis,et al.  Challenges for Artificial Immune Systems , 2005, WIRN/NAIS.

[255]  石黒 章夫 Emergent Construction of Artificial Immune Networks for Autonomous Mobile Robots , 1997 .

[256]  Franco Celada,et al.  Modeling immune cognition , 1998, SMC'98 Conference Proceedings. 1998 IEEE International Conference on Systems, Man, and Cybernetics (Cat. No.98CH36218).

[257]  Shengxiang Yang,et al.  A comparative study of immune system based genetic algorithms in dynamic environments , 2006, GECCO.

[258]  Fabio Freschi,et al.  Multiobjective Optimization by a Modified Artificial Immune System Algorithm , 2005, ICARIS.

[259]  Dipankar Dasgupta,et al.  Artificial neural networks and artificial immune systems: similarities and differences , 1997, 1997 IEEE International Conference on Systems, Man, and Cybernetics. Computational Cybernetics and Simulation.

[260]  Peter Ross,et al.  The evolution and analysis of potential antibody library for use in job-shop scheduling , 1999 .

[261]  Slawomir T. Wierzchon,et al.  Deriving a concise description of non-self patterns in an artificial immune system , 2002 .

[262]  G W Hoffmann,et al.  A neural network model based on the analogy with the immune system. , 1986, Journal of theoretical biology.

[263]  Jonathan Timmis,et al.  On Immune Inspired Homeostasis for Electronic Systems , 2007, ICARIS.

[264]  Rui Vilela Mendes,et al.  Using immunology principles for fault detection , 2003, IEEE Trans. Ind. Electron..

[265]  Christian Jacob,et al.  The Swarming Body: Simulating the Decentralized Defenses of Immunity , 2006, ICARIS.

[266]  Colin G. Johnson Computation in Cells and Tissues : Perspectives and Tools of Thought , 2022 .

[267]  H.,et al.  The Immune System as a Model for Pattern Recognition and Classification , 1999 .

[268]  A. Perelson,et al.  Size and connectivity as emergent properties of a developing immune network. , 1991, Journal of theoretical biology.

[269]  Uwe Aickelin,et al.  Price Trackers Inspired by Immune Memory , 2006, ICARIS.

[270]  Hitoshi Iba,et al.  Inductive genetic programming with immune network dynamics , 1999 .

[271]  Gary B. Lamont,et al.  A distributed architecture for an adaptive computer virus immune system , 1998, SMC'98 Conference Proceedings. 1998 IEEE International Conference on Systems, Man, and Cybernetics (Cat. No.98CH36218).

[272]  L.N. de Castro Comparing immune and neural networks , 2002, VII Brazilian Symposium on Neural Networks, 2002. SBRN 2002. Proceedings..

[273]  Xin Wang,et al.  A Novel Fast Negative Selection Algorithm Enhanced by State Graphs , 2007, ICARIS.

[274]  Christian Jacob,et al.  Immunity Through Swarms: Agent-Based Simulations of the Human Immune System , 2004, ICARIS.

[275]  Mark Neal,et al.  An artificial immune system for continuous analysis of time-varying data , 2002 .

[276]  Vincenzo Cutello,et al.  Exploring the Capability of Immune Algorithms: A Characterization of Hypermutation Operators , 2004, ICARIS.

[277]  Jacques Tisseau,et al.  A multiagent system to model an human humoral response , 1997, 1997 IEEE International Conference on Systems, Man, and Cybernetics. Computational Cybernetics and Simulation.

[278]  Iain Bate,et al.  Applying artificial immune systems to real-time embedded systems , 2007, 2007 IEEE Congress on Evolutionary Computation.

[279]  Philip K. Chan,et al.  Learning Patterns from Unix Process Execution Traces for Intrusion Detection , 1997 .

[280]  Stephanie Forrest,et al.  John Holland’s Invisible Hand: An Artificial Immune System , 1999 .

[281]  Simon M. Garrett,et al.  Evaluating Theories of Immunological Memory Using Large-Scale Simulations , 2005, ICARIS.

[282]  Joanne H. Walker,et al.  Dynamic Function Optimisation: Comparing the Performance of Clonal Selection and Evolution Strategies , 2003, ICARIS.

[283]  Yoshikazu Yamamoto,et al.  A Decentralized Policy Coordination Facility in OpenWebServer , 2000 .

[284]  Gerry V. Dozier,et al.  Immunity-based intrusion detection system design, vulnerability analysis, and GENERTIA's genetic arms race , 2005, SAC '05.

[285]  Alex Alves Freitas,et al.  A Danger Theory Inspired Approach to Web Mining , 2003, ICARIS.

[286]  Ferat Sahin,et al.  An AIS approach to a color image classification problem in a real time industrial application , 2001, 2001 IEEE International Conference on Systems, Man and Cybernetics. e-Systems and e-Man for Cybernetics in Cyberspace (Cat.No.01CH37236).

[287]  Hugues Bersini,et al.  The Immune Recruitment Mechanism: A Selective Evolutionary Strategy , 1991, ICGA.

[288]  Leandro Nunes de Castro,et al.  A Pruning Self-Organizing Algorithm to Select Centers of Radial Basis Function Neural Networks , 2001 .

[289]  T. Fukuda,et al.  Immune Networks Using Genetic Algorithm for Adaptive Production Scheduling , 1993 .

[290]  Cristiano Panazio,et al.  Immune-inspired Dynamic Optimization for Blind Spatial Equalization in Undermodeled Channels , 2006, 2006 IEEE International Conference on Evolutionary Computation.

[291]  Leandro Nunes de Castro,et al.  Artificial Immune Systems: Part I-Basic Theory and Applications , 1999 .

[292]  Naruaki Toma,et al.  Immune algorithm with immune network and MHC for adaptive problem solving , 1999, IEEE SMC'99 Conference Proceedings. 1999 IEEE International Conference on Systems, Man, and Cybernetics (Cat. No.99CH37028).

[293]  D. Dasgupta,et al.  The fuzzy artificial immune system: motivations, basic concepts, and application to clustering and Web profiling , 2002, 2002 IEEE World Congress on Computational Intelligence. 2002 IEEE International Conference on Fuzzy Systems. FUZZ-IEEE'02. Proceedings (Cat. No.02CH37291).

[294]  Lin Han,et al.  A novel binary differential evolution algorithm based on artificial immune system , 2007, 2007 IEEE Congress on Evolutionary Computation.

[295]  Julie Greensmith,et al.  The Application of a Dendritic Cell Algorithm to a Robotic Classifier , 2007, ICARIS.

[296]  Zhou Ji,et al.  Estimating the detector coverage in a negative selection algorithm , 2005, GECCO '05.

[297]  Kwang Hyung Lee,et al.  First Course on Fuzzy Theory and Applications , 2005, Advances in Soft Computing.

[298]  Michael Gilfix An integrated software immune system: a framework for automated network management, system health, and security , 1999, Proceedings 24th Conference on Local Computer Networks. LCN'99.

[299]  Yoshiki Uchikawa,et al.  Moderationism in the immune system: gait acquisition of a legged robot using the metadynamics function , 1998, SMC'98 Conference Proceedings. 1998 IEEE International Conference on Systems, Man, and Cybernetics (Cat. No.98CH36218).

[300]  Ron R. Hightower,et al.  The Evolution of Cooperation in Immune System Gene Libraries , 2022 .

[301]  Uwe Aickelin,et al.  An Artificial Immune System as a Recommender for Web Sites , 2002 .

[302]  V. Rao Vemuri,et al.  An artificial immune system approach to document clustering , 2005, SAC '05.

[303]  Stephanie Forrest,et al.  Intrusion Detection Using Sequences of System Calls , 1998, J. Comput. Secur..

[304]  N K Jerne,et al.  Towards a network theory of the immune system. , 1973, Annales d'immunologie.

[305]  Henry Y. K. Lau,et al.  General Suppression Control Framework: Application in Self-balancing Robots , 2005, ICARIS.

[306]  Gianni Tedesco,et al.  Diophantine Benchmarks for the B-Cell Algorithm , 2006, ICARIS.

[307]  Keith E. Mathias,et al.  Agent Support Of Genetic Search In An Immunological Model Of Sparse Distributed Memory , 2002, GECCO.

[308]  Alan S. Perelson,et al.  The Evolution of Emergent Organization in Immune System Gene Libraries , 1995, ICGA.

[309]  Dipankar Dasgupta,et al.  An Overview of Artificial Immune Systems and Their Applications , 1993 .

[310]  Jaroslav Stark,et al.  Combining cytokine signalling with T-bet and GATA-3 regulation in Th1 and Th2 differentiation: a model for cellular decision-making. , 2004, Journal of theoretical biology.

[311]  Mohammad Saniee Abadeh,et al.  Intrusion detection using a hybridization of evolutionary fuzzy systems and artificial immune systems , 2007, 2007 IEEE Congress on Evolutionary Computation.

[312]  Peter J. Bentley,et al.  An artificial immune model for network intrusion detection , 1999 .

[313]  Slawomir T. Wierzchon Multimodal Optimization with Artificial Immune Systems , 2001, Intelligent Information Systems.

[314]  Fernando José Von Zuben,et al.  Fault Detection Algorithm for Telephone Systems Based on the Danger Theory , 2005, ICARIS.

[315]  J. Neidhoefer,et al.  Immunized Adaptive Critic for an Autonomous Aircraft Control Application , 1999 .

[316]  Dong Xiang,et al.  Information-theoretic measures for anomaly detection , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.

[317]  Stephanie Forrest,et al.  Generating biomorphs with an aesthetic immune system , 2002 .

[318]  Alexander O. Tarakanov,et al.  Information Security with Formal Immune Networks , 2001, MMM-ACNS.

[319]  Fabio A. González,et al.  An immuno-fuzzy approach to anomaly detection , 2003, The 12th IEEE International Conference on Fuzzy Systems, 2003. FUZZ '03..

[320]  Paulo Lício de Geus,et al.  An intrusion detection system using ideas from the immune system , 2004, IEEE Congress on Evolutionary Computation.

[321]  Jeffrey O. Kephart,et al.  Blueprint for a Computer Immune System , 1999 .

[322]  Leandro Nunes de Castro,et al.  An Immunological Approach to Initialize Feedforward Neural Network Weights , 2001 .

[324]  Fernando José Von Zuben,et al.  Application of an Artificial Immune System in a Compositional Timbre Design Technique , 2005, ICARIS.

[325]  Fernando José Von Zuben,et al.  Adaptive Radius Immune Algorithm for Data Clustering , 2005, ICARIS.

[326]  Shi Wengang,et al.  Negative-selection algorithm based approach for fault diagnosis of rotary machinery , 2002, Proceedings of the 2002 American Control Conference (IEEE Cat. No.CH37301).

[327]  Leandro Nunes de Castro,et al.  The Influence of Diversity in an Immune-Based Algorithm to Train MLP Networks , 2007, ICARIS.

[328]  L. Segel,et al.  Design Principles for the Immune System and Other Distributed Autonomous Systems , 2001 .

[329]  Jonathan Timmis,et al.  Immune Inspired Somatic Contiguous Hypermutation for Function Optimisation , 2003, GECCO.

[330]  A HofmeyrSteven,et al.  Intrusion Detection via System Call Traces , 1997 .

[331]  Gregg H. Gunsch,et al.  Novel steganography detection using an artificial immune system approach , 2003, The 2003 Congress on Evolutionary Computation, 2003. CEC '03..

[332]  Bruce C. Trapnell A Peer-to-Peer Blacklisting Strategy Inspired by Leukocyte-Endothelium Interaction , 2005, ICARIS.

[333]  C. Janeway Immunobiology: The Immune System in Health and Disease , 1996 .

[334]  Peter J. Bentley,et al.  Towards an artificial immune system for network intrusion detection: an investigation of dynamic clonal selection , 2002, Proceedings of the 2002 Congress on Evolutionary Computation. CEC'02 (Cat. No.02TH8600).

[335]  Peter J. Bentley,et al.  Negative selection and niching by an artificial immune system for network intrusion detection , 1999 .

[336]  Stephanie Forrest,et al.  Anomaly intrusion detection in dynamic execution environments , 2002, NSPW '02.

[337]  Steven A. Frank,et al.  The Design of Natural and Artificial Adaptive Systems , 1996 .

[338]  David W. Corne,et al.  An Investigation of the Negative Selection Algorithm for Fault Detection in Refrigeration Systems , 2003, ICARIS.

[339]  Andries P. Engelbrecht,et al.  Using a threshold function to determine the status of lymphocytes in the artificial immune system , 2003 .

[340]  Hugues Bersini,et al.  The Endogenous Double Plasticity of the Immune Network and the Inspiration to be drawn for Engineering Artifacts , 1993 .

[341]  Alan S. Perelson,et al.  Searching for Diverse, Cooperative Populations with Genetic Algorithms , 1993, Evolutionary Computation.

[342]  Andries Petrus Engelbrecht,et al.  A local network neighbourhood artificial immune system for data clustering , 2007, 2007 IEEE Congress on Evolutionary Computation.

[343]  Alex A. Freitas,et al.  An immunological algorithm for discovering small-disjunct rules in data mining , 2001 .

[344]  Agostinho C. Rosa,et al.  Immune System Simulation through a Complex Adaptive System Model , 2002 .

[345]  Franco Celada,et al.  Affinity maturation and hypermutation in a simulation of the humoral immune response , 1996, European journal of immunology.

[346]  Hamed Shah-Hosseini The Time Adaptive Self-Organizing Map is a Neural Network Based on Artificial Immune System , 2006, The 2006 IEEE International Joint Conference on Neural Network Proceedings.

[347]  Min Zhao,et al.  Hybrid detector set: detectors with different affinity , 2004, InfoSecu '04.

[348]  Krzysztof Trojanowski,et al.  Memory Management in Artificial Immune System , 2003 .

[349]  P. Marrack,et al.  How the immune system recognizes the body. , 1993, Scientific American.

[350]  Henry Y. K. Lau,et al.  Immunologic Control Framework for Automated Material Handling , 2003, ICARIS.

[351]  Abder Koukam,et al.  Immune-based middleware for large scale network , 2002, 27th Annual IEEE Conference on Local Computer Networks, 2002. Proceedings. LCN 2002..

[352]  Azzedine Boukerche,et al.  Intrusion detection based on the immune human system , 2002, Proceedings 16th International Parallel and Distributed Processing Symposium.

[353]  Peter J. Bentley,et al.  Danger Is Ubiquitous: Detecting Malicious Activities in Sensor Networks Using the Dendritic Cell Algorithm , 2006, ICARIS.

[354]  Yoshiteru Ishida Fully distributed diagnosis by PDP learning algorithm: towards immune network PDP model , 1990, 1990 IJCNN International Joint Conference on Neural Networks.

[355]  G. G. Stokes "J." , 1890, The New Yale Book of Quotations.

[356]  Ben Paechter,et al.  Revisiting the Central and Peripheral Immune System , 2007, ICARIS.

[357]  N. Saiwaki,et al.  An approach to visualization of active position in brain by MEG , 2000, Smc 2000 conference proceedings. 2000 ieee international conference on systems, man and cybernetics. 'cybernetics evolving to systems, humans, organizations, and their complex interactions' (cat. no.0.

[358]  Senhua Yu,et al.  MILA - Multilevel Immune Learning Algorithm , 2003, GECCO.

[359]  W. Dilger Decentralized autonomous organization of the intelligent home according to the principle of the immune system , 1997, 1997 IEEE International Conference on Systems, Man, and Cybernetics. Computational Cybernetics and Simulation.

[360]  Gilbert L. Peterson,et al.  An evolutionary algorithm to generate hyper-ellipsoid detectors for negative selection , 2005, GECCO '05.

[361]  Yoshiki Uchikawa,et al.  Evolutionary construction of an immune network-based behavior arbitration mechanism for autonomous mobile robots , 1998 .

[362]  W. Paul Immunology: Recognition and Response : Readings from Scientific American Magazine , 1991 .

[363]  Max H. Garzon,et al.  A DNA based artificial immune system for self-nonself discrimination , 1997, 1997 IEEE International Conference on Systems, Man, and Cybernetics. Computational Cybernetics and Simulation.

[364]  Kazuhiko Takahashi,et al.  Application of an Immune Feedback Mechanism to Control Systems. , 1998 .

[365]  Jon Timmis,et al.  aiVIS - Artificial Immune Network Visualisation , 2001 .

[366]  Dipankar Dasgupta An artificial immune system as a multi-agent decision support system , 1998, SMC'98 Conference Proceedings. 1998 IEEE International Conference on Systems, Man, and Cybernetics (Cat. No.98CH36218).

[367]  Fernando J. Von Zuben,et al.  Designing Ensembles of Fuzzy Classification Systems: An Immune-Inspired Approach , 2005, ICARIS.

[368]  Simon M. Garrett A Paratope Is Not an Epitope: Implications for Immune Network Models and Clonal Selection , 2003, ICARIS.

[369]  Alan S. Perelson,et al.  Stochastic stage-structured modeling of the adaptive immune system , 2003, Computational Systems Bioinformatics. CSB2003. Proceedings of the 2003 IEEE Bioinformatics Conference. CSB2003.

[370]  Werner Dilger,et al.  Properties of the bersini experiment on self-assertion , 2006, GECCO '06.

[371]  Parag K. Lala,et al.  Human immune system inspired architecture for self-healing digital systems , 2002, Proceedings International Symposium on Quality Electronic Design.

[372]  Stephanie Forrest,et al.  Automated response using system-call delays , 2000 .

[373]  James H. Graham,et al.  Computer Immunology and Neural Network Models for Masquerader Detection , 2004, CAINE.

[374]  Fabio A. González,et al.  The Effect of Binary Matching Rules in Negative Selection , 2003, GECCO.

[375]  Calton Pu,et al.  A Specialization Toolkit to Increase the Diversity of Operating Systems , 1996 .

[376]  Vincenzo Cutello,et al.  A Clonal Selection Algorithm for Coloring, Hitting Set and Satisfiability Problems , 2005, WIRN/NAIS.

[377]  V. Devarajan,et al.  Artificial immune systems and aerial image segmentation , 1997, 1997 IEEE International Conference on Systems, Man, and Cybernetics. Computational Cybernetics and Simulation.

[378]  Werner Dilger,et al.  AIS Based Robot Navigation in a Rescue Scenario , 2004, ICARIS.

[379]  Andrew M. Tyrrell,et al.  Hardware fault tolerance: an immunological solution , 2000, Smc 2000 conference proceedings. 2000 ieee international conference on systems, man and cybernetics. 'cybernetics evolving to systems, humans, organizations, and their complex interactions' (cat. no.0.

[380]  Hitoshi Iba,et al.  Multimodal Search with Immune Based Genetic Programming , 2004, ICARIS.

[381]  Lei Wang,et al.  Immune mechanism based computer security design , 2002, Proceedings. International Conference on Machine Learning and Cybernetics.

[382]  Alan S. Perelson,et al.  The Baldwin effect in the immune system: learning by somatic hypermutation , 1996 .

[383]  Jon Timmis,et al.  Data analysis using artificial immune systems, cluster analysis and Kohonen networks: some comparisons , 1999, IEEE SMC'99 Conference Proceedings. 1999 IEEE International Conference on Systems, Man, and Cybernetics (Cat. No.99CH37028).

[384]  Jeffrey O. Kephart,et al.  Biologically Inspired Defenses Against Computer Viruses , 1995, IJCAI.

[385]  Jean-Yves Le Boudec,et al.  An Artificial Immune System for Misbehavior Detection in Mobile Ad-Hoc Networks with Virtual Thymus, Clustering, Danger Signal and Memory Detectors , 2004, Int. J. Unconv. Comput..

[386]  N. K. Jerne The generative grammar of the immune system. , 1985 .

[387]  A S Perelson,et al.  Variable efficacy of repeated annual influenza vaccination. , 1999, Proceedings of the National Academy of Sciences of the United States of America.

[388]  Doheon Lee,et al.  Integration of Immune Models Using Petri Nets , 2004, ICARIS.

[389]  Guang-Da Hu,et al.  A novel control algorithm based on immune feedback principle , 2002, Proceedings. International Conference on Machine Learning and Cybernetics.

[390]  John E. Hunt,et al.  Case Memory and Retrieval Based on the Immune System , 1995, ICCBR.

[391]  L. Segel,et al.  Th1 or Th2: How an appropriate T helper response can be made , 2001, Bulletin of mathematical biology.

[392]  A S Perelson,et al.  Modeling and optimization of populations subject to time-dependent mutation. , 1995, Proceedings of the National Academy of Sciences of the United States of America.

[393]  Vincent Rodin,et al.  Immune Mechanisms to Regulate Multi-Agents Systems , 2000 .

[394]  Julie Greensmith,et al.  An Artificial Immune System Approach to Semantic Document Classification , 2003, ICARIS.

[395]  Fernando Nino,et al.  A change detection software agent based on immune mixed selection , 2002, Proceedings of the 2002 Congress on Evolutionary Computation. CEC'02 (Cat. No.02TH8600).

[396]  Alan S. Perelson,et al.  Modeling the effects of updating the influenza vaccine on the efficacy of repeated vaccination , 2000 .

[397]  N. K. Jerne,et al.  Clonal selection in a lymphocyte network. , 1974, Society of General Physiologists series.

[398]  Gary B. Lamont,et al.  A retrovirus inspired algorithm for virus detection & optimization , 2006, GECCO.

[399]  S. Forrest,et al.  A Distributed Approach to Anomaly Detection , 1998 .

[400]  Fernando José Von Zuben,et al.  Immune and Neural Network Models: Theoretical and Empirical Comparisons , 2001, Int. J. Comput. Intell. Appl..

[401]  Tamás Roska,et al.  Artificial immune systems based novelty detection with CNN-UM , 2007, 2007 IEEE Symposium on Foundations of Computational Intelligence.

[402]  Tony White,et al.  Immunity from Spam: An Analysis of an Artificial Immune System for Junk Email Detection , 2005, ICARIS.

[403]  Rafal Pasek,et al.  Theoretical Basis of Novelty Detection in Time Series Using Negative Selection Algorithms , 2006, ICARIS.

[404]  John E. Hunt,et al.  Immunizing against fraud , 1996, KDD 1996.

[405]  Sara Reese Hedberg,et al.  Combating computer viruses: IBM's new computer immune system , 1996, IEEE Parallel Distributed Technol. Syst. Appl..

[406]  Manfred M. Fischer Fundamentals in Neurocomputing , 1994 .

[407]  Debashish Chowdhury,et al.  Robustness of the network models of immune response , 1990 .

[408]  I. Cohen,et al.  The cognitive principle challenges clonal selection. , 1992, Immunology today.

[409]  James Lyle Peterson,et al.  Petri net theory and the modeling of systems , 1981 .

[410]  Fabian Vargas,et al.  A New On-Line Robust Approach to Design Noise-Immune Speech Recognition Systems , 2003, J. Electron. Test..

[411]  Andrew M. Tyrrell,et al.  Immunotronics - novel finite-state-machine architectures with built-in self-test using self-nonself differentiation , 2002, IEEE Trans. Evol. Comput..

[412]  Patrik D'haeseleer,et al.  An immunological approach to change detection: theoretical results , 1996, Proceedings 9th IEEE Computer Security Foundations Workshop.

[413]  V. Cutello,et al.  An Immune Algorithm with Hyper – Macromutations for the 2 D Hydrophilic-Hydrophobic Model , 2022 .

[414]  S. Forrest Engineering an Immune System , 2001 .

[415]  R. O. Canham,et al.  A MULTILAYERED IMMUNE SYSTEM FOR HARDWARE FAULT TOLERANCE WITHIN AN EMBRYONIC ARRAY , 2002 .

[416]  Stephanie Forrest,et al.  Operating system stability and security through process homeostasis , 2002 .

[417]  Fernando José Von Zuben,et al.  Implementation of an immuno-genetic network on a real Khepera II robot , 2003, The 2003 Congress on Evolutionary Computation, 2003. CEC '03..

[418]  Robert Kozma,et al.  From neurocomputation to immunocomputation - a model and algorithm for fluctuation-induced instability and phase transition in biological systems , 2002, IEEE Trans. Evol. Comput..

[419]  J Faro,et al.  Studies on a recent class of network models of the immune system. , 1993, Journal of theoretical biology.

[420]  Kazuyuki Mori,et al.  Application of an immune algorithm to multi-optimization problems , 1997 .

[421]  Gary B. Lamont,et al.  A distributed architecture for a self-adaptive computer virus immune system , 1999 .

[422]  Zhou Ji,et al.  Real-Valued Negative Selection Algorithm with Variable-Sized Detectors , 2004, GECCO.

[423]  Richard A. Lake Immunology: Recognition and response , 1992 .

[424]  Jeffrey O. Kephart,et al.  A biologically inspired immune system for computers , 1994 .

[425]  Ulrich Behn,et al.  Randomly Evolving Idiotypic Networks: Analysis of Building Principles , 2006, ICARIS.

[426]  Victoria S. Uren,et al.  Immune-Inspired Adaptive Information Filtering , 2006, ICARIS.

[427]  D. Stauffer,et al.  A discrete model for immune surveillance, tumor immunity and cancer. , 1991, Journal of theoretical biology.

[428]  Gastone C. Castellani,et al.  Memory and Selectivity in Evolving Scale-Free Immune Networks , 2003, ICARIS.

[429]  Peter J. Bentley,et al.  Immune Memory in the Dynamic Clonal Selection Algorithm , 2002 .

[430]  Alexander O. Tarakanov,et al.  Signal Processing by an Immune Type Tree Transform , 2003, ICARIS.

[431]  Fernando José Von Zuben,et al.  A Supervised Constructive Neuro-Immune Network for Pattern Classification , 2006, The 2006 IEEE International Joint Conference on Neural Network Proceedings.

[432]  C. Janeway How the immune system recognizes invaders. , 1993, Scientific American.

[433]  Alex Alves Freitas,et al.  Revisiting the Foundations of Artificial Immune Systems: A Problem-Oriented Perspective , 2003, ICARIS.

[434]  Stephanie Forrest,et al.  Principles of a computer immune system , 1998, NSPW '97.

[435]  Mark Neal,et al.  Investigating the evolution and stability of a resource limited artificial immune system. , 2000 .

[436]  Shyh-Jier Huang,et al.  An immune-based optimization method to capacitor placement in a radial distribution system , 2000 .

[437]  Kwee-Bo Sim,et al.  Artificial immune network-based cooperative control in collective autonomous mobile robots , 1997, Proceedings 6th IEEE International Workshop on Robot and Human Communication. RO-MAN'97 SENDAI.

[438]  Fang Liu,et al.  The Quaternion Model of Artificial Immune Response , 2005, ICARIS.

[439]  Coniferous softwood Artificial Immune System for Discovering Heuristics in Othello , 2006 .

[440]  F. Varela,et al.  Natural tolerance in a simple immune network. , 1995, Journal of theoretical biology.

[441]  Alan S. Perelson,et al.  Growth and Recruitment in the Immune Network , 1992 .

[442]  M. Eaman Immune system. , 2000, Nursing standard (Royal College of Nursing (Great Britain) : 1987).

[443]  Senhua Yu,et al.  MILA – multilevel immune learning algorithm and its application to anomaly detection , 2005, Soft Comput..

[444]  I. Yoshiteru,et al.  The Immune System as a Self-Identification Process: a Survey and a Proposal , 1996 .

[445]  Krzysztof Trojanowski,et al.  The Idiotypic Network with Binary Patterns Matching , 2006, ICARIS.

[446]  Jonathan Timmis,et al.  Immune and Evolutionary Approaches to Software Mutation Testing , 2007, ICARIS.

[447]  Gary B. Lamont,et al.  An artificial immune system strategy for robust chemical spectra classification via distributed heterogeneous sensors , 2004, Proceedings of the 2004 Congress on Evolutionary Computation (IEEE Cat. No.04TH8753).

[448]  Ben Paechter,et al.  An Immune-Inspired Approach to Speckled Computing , 2007, ICARIS.

[449]  Peter J. Bentley,et al.  Towards an artificial immune system for network intrusion detection: an investigation of clonal selection with a negative selection operator , 2001, Proceedings of the 2001 Congress on Evolutionary Computation (IEEE Cat. No.01TH8546).

[450]  Walmir M. Caminhas,et al.  Towards a Novel Immune Inspired Approach to Temporal Anomaly Detection , 2007, ICARIS.

[451]  I. Cohen The cognitive paradigm and the immunological homunculus. , 1992, Immunology today.

[452]  Tang Zhong,et al.  An artificial immune algorithm based on bidding of power market , 2002, Proceedings. International Conference on Power System Technology.

[453]  P E Seiden,et al.  A computer model of cellular interactions in the immune system. , 1992, Immunology today.

[454]  A. B. Watkins,et al.  A resource limited artificial immune classifier , 2002, Proceedings of the 2002 Congress on Evolutionary Computation. CEC'02 (Cat. No.02TH8600).

[455]  Robert Kozma,et al.  Dynamical neuro-representation of an immune model and its application for data classification , 2002, Proceedings of the 2002 International Joint Conference on Neural Networks. IJCNN'02 (Cat. No.02CH37290).

[456]  Spyros Xanthakis,et al.  Immune System and Fault-Tolerant Computing , 1995, Artificial Evolution.

[457]  Steve R. White,et al.  Anatomy of a Commercial-Grade Immune System , 1999 .

[458]  O C Martin,et al.  Memory capacity in large idiotypic networks. , 1995, Bulletin of mathematical biology.

[459]  A S Perelson,et al.  Pattern formation in one- and two-dimensional shape-space models of the immune system. , 1992, Journal of theoretical biology.

[460]  L.N. de Castro,et al.  An artificial immune network for multimodal function optimization , 2002, Proceedings of the 2002 Congress on Evolutionary Computation. CEC'02 (Cat. No.02TH8600).

[461]  P ? ? ? ? ? ? ? % ? ? ? ? , 1991 .

[462]  Fernando Niño,et al.  A Novel Immune Anomaly Detection Technique Based on Negative Selection , 2003, GECCO.

[463]  Ludmilla Sokolova,et al.  Index Design by Immunocomputing , 2003, ICARIS.

[464]  Slawomir T. Wierzchon,et al.  Generating Optimal Repertoire of Antibody Strings in an Artificial Immune System , 2000, Intelligent Information Systems.

[465]  Alexander O. Tarakanov,et al.  Spatial Formal Immune Network , 2003, GECCO.

[466]  Zhou Ji,et al.  Augmented negative selection algorithm with variable-coverage detectors , 2004, Proceedings of the 2004 Congress on Evolutionary Computation (IEEE Cat. No.04TH8753).

[467]  Dipankar Dasgupta,et al.  Anomaly detection in multidimensional data using negative selection algorithm , 2002, Proceedings of the 2002 Congress on Evolutionary Computation. CEC'02 (Cat. No.02TH8600).

[468]  Andreas Pietzowski,et al.  An artificial immune system and its integration into an organic middleware for self-protection , 2006, GECCO '06.

[469]  Jonathan Timmis,et al.  Exploiting Immunological Properties for Ubiquitous Computing Systems , 2004, ICARIS.

[470]  Tony White,et al.  The application of antigenic search techniques to time series forecasting , 2005, GECCO '05.

[471]  Uwe Aickelin,et al.  Idiotypic Immune Networks in Mobile-Robot Control , 2007, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).

[472]  Peter Ross,et al.  Exploiting the analogy between immunology and sparse distributedmemories : a system for lustering non-stationary data , 2002 .

[473]  A. Coutinho,et al.  Beyond Clonal Selection and Network , 1989, Immunological reviews.

[474]  Gajendra P. S. Raghava,et al.  BcePred: Prediction of Continuous B-Cell Epitopes in Antigenic Sequences Using Physico-chemical Properties , 2004, ICARIS.

[475]  Claudia Eckert,et al.  On Permutation Masks in Hamming Negative Selection , 2006, ICARIS.

[476]  Dipankar Dasgupta,et al.  An immunochip architecture and its emulation , 2002, Proceedings 2002 NASA/DoD Conference on Evolvable Hardware.

[477]  Hugues Bersini,et al.  The immune and the chemical crossover , 2002, IEEE Trans. Evol. Comput..

[478]  A. Perelson Immune Network Theory , 1989, Immunological reviews.

[479]  María Cristina Riff,et al.  Towards an immune system that solves CSP , 2007, 2007 IEEE Congress on Evolutionary Computation.

[480]  Dipankar Dasgupta,et al.  Tool Breakage Detection in Milling Operations using a Negative-Selection Algorithm , 1995 .

[481]  Hugues Bersini,et al.  Frustration induced chaos in a system of coupled ODE's , 1995 .

[482]  Stephanie Forrest,et al.  Immunity by design: an artificial immune system , 1999 .

[483]  Fabio A. González,et al.  A comparative analysis of artificial immune network models , 2005, GECCO '05.

[484]  Jon Timmis,et al.  Artificial Immune Recognition System (AIRS): Revisions and Refinements , 2002 .

[485]  Rui Xia,et al.  Electricity reference price forecasting with Fuzzy C-means and Immune Algorithm , 2007, 2007 IEEE Congress on Evolutionary Computation.

[486]  J. Suzuki Building an Artificial Immune Network for Decentralized Policy Negotiation in a Communication Endsystem: OpenWebServer/iNexus Study , 2000 .

[487]  D. Stauffer,et al.  A unified discrete model of immune response. , 1990, Journal of theoretical biology.

[488]  Zhou Ji,et al.  Applicability issues of the real-valued negative selection algorithms , 2006, GECCO '06.

[489]  Alex A. Freitas,et al.  Towards a Danger Theory Inspired Artificial Immune System for Web Mining , 2005 .

[490]  Stephanie Forrest,et al.  Coverage and Generalization in an Artificial Immune System , 2002, GECCO.

[491]  John E. Hunt,et al.  An adaptive, distributed learning system based on the immune system , 1995, 1995 IEEE International Conference on Systems, Man and Cybernetics. Intelligent Systems for the 21st Century.

[492]  Simon M. Garrett,et al.  Improved Pattern Recognition with Artificial Clonal Selection? , 2003, ICARIS.

[493]  Catriona M. Kennedy Evolution of self-definition , 1998, SMC'98 Conference Proceedings. 1998 IEEE International Conference on Systems, Man, and Cybernetics (Cat. No.98CH36218).

[494]  Yoshiteru Ishida Distributed and autonomous sensing based on the immune network , 2006, Artificial Life and Robotics.