The Effect of Binary Matching Rules in Negative Selection
暂无分享,去创建一个
[1] Leandro Nunes de Castro,et al. Artificial Immune Systems: A New Computational Approach , 2002 .
[2] Fabio A. González,et al. An immunity-based technique to characterize intrusions in computer networks , 2002, IEEE Trans. Evol. Comput..
[3] Paul Helman,et al. An immunological approach to change detection: algorithms, analysis and implications , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[4] Carlos A. Coello Coello,et al. A parallel implementation of an artificial immune system to handle constraints in genetic algorithms: preliminary results , 2002, IEEE Congress on Evolutionary Computation.
[5] Dipankar Dasgupta,et al. Neuro-Immune and Self-Organizing Map Approaches to Anomaly Detection: A Comparison , 2002 .
[6] Jonathan Timmis,et al. A resource limited artificial immune system for data analysis , 2001, Knowl. Based Syst..
[7] D. Dasgupta,et al. Combining negative selection and classification techniques for anomaly detection , 2002, Proceedings of the 2002 Congress on Evolutionary Computation. CEC'02 (Cat. No.02TH8600).
[8] Alan S. Perelson,et al. The immune system, adaptation, and machine learning , 1986 .
[9] Jerne Nk. Towards a network theory of the immune system. , 1974 .
[10] Andrew M. Tyrrell. Computer Know Thy Self!: A Biological Way to Look at Fault-Tolerance , 1999, EUROMICRO.
[11] Gregg H. Gunsch,et al. An artificial immune system architecture for computer security applications , 2002, IEEE Trans. Evol. Comput..
[12] Stephanie Forrest,et al. Coverage and Generalization in an Artificial Immune System , 2002, GECCO.
[13] Jonathan Timmis,et al. Artificial immune systems - a new computational intelligence paradigm , 2002 .
[14] John H. Holland,et al. Induction: Processes of Inference, Learning, and Discovery , 1987, IEEE Expert.
[15] Kevin P. Anchor,et al. CDIS: Towards a Computer Immune System for Detecting Network Intrusions , 2001, Recent Advances in Intrusion Detection.
[16] Peter J. Bentley,et al. An evaluation of negative selection in an artificial immune system for network intrusion detection , 2001 .
[17] Dipankar Dasgupta,et al. Tool Breakage Detection in Milling Operations using a Negative-Selection Algorithm , 1995 .
[18] F. von Zuben,et al. An evolutionary immune network for data clustering , 2000, Proceedings. Vol.1. Sixth Brazilian Symposium on Neural Networks.
[19] D. Dasgupta. Artificial Immune Systems and Their Applications , 1998, Springer Berlin Heidelberg.
[20] Dipankar Dasgupta. An Overview of Artificial Immune Systems and Their Applications , 1993 .
[21] L. Segel,et al. Design Principles for the Immune System and Other Distributed Autonomous Systems , 2001 .
[22] Dipankar Dasgupta,et al. Novelty detection in time series data using ideas from immunology , 1996 .
[23] Stephanie Forrest,et al. Architecture for an Artificial Immune System , 2000, Evolutionary Computation.
[24] A.M. Tyrell,et al. Computer know thy self!: a biological way to look at fault-tolerance , 1999, Proceedings 25th EUROMICRO Conference. Informatics: Theory and Practice for the New Millennium.
[25] Alan S. Perelson,et al. Self-nonself discrimination in a computer , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.
[26] Stephanie Forrest,et al. Revisiting LISYS: parameters and normal behavior , 2002, Proceedings of the 2002 Congress on Evolutionary Computation. CEC'02 (Cat. No.02TH8600).