Negative selection algorithm with constant detectors for anomaly detection
暂无分享,去创建一个
Dong Li | Shulin Liu | Hongli Zhang | Shulin Liu | Hongli Zhang | Dong Li
[1] Ming Chen,et al. Adaptive BER-constraint-based power allocation for downlink MC-CDMA systems with linear MMSE receiver , 2010, 2010 IEEE 12th International Conference on Communication Technology.
[2] Gilbert L. Peterson,et al. An Evolutionary Algorithm to Generate Ellipsoid Detectors for Negative Selection , 2012 .
[3] Zhou Ji,et al. Real-Valued Negative Selection Algorithm with Variable-Sized Detectors , 2004, GECCO.
[4] Li Tao,et al. Negative selection algorithm based on grid file of the feature space , 2014 .
[5] Fernando Niño,et al. A Framework for Evolving Multi-Shaped Detectors in Negative Selection , 2007, 2007 IEEE Symposium on Foundations of Computational Intelligence.
[6] Alan S. Perelson,et al. Self-nonself discrimination in a computer , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.
[7] Tao Li,et al. A negative selection algorithm based on hierarchical clustering of self set , 2011, Science China Information Sciences.
[8] Jung-Min Park,et al. An overview of anomaly detection techniques: Existing solutions and latest technological trends , 2007, Comput. Networks.
[9] Li-Fei Chen. An improved negative selection approach for anomaly detection: with applications in medical diagnosis and quality inspection , 2011, Neural Computing and Applications.
[10] Gilbert L. Peterson,et al. An evolutionary algorithm to generate ellipsoid network intrusion detectors , 2005, GECCO '05.
[11] Zhou Ji,et al. Revisiting Negative Selection Algorithms , 2007, Evolutionary Computation.
[12] Guilherme Costa Silva,et al. Immune inspired Fault Detection and Diagnosis: A fuzzy-based approach of the negative selection algorithm and participatory clustering , 2012, Expert Syst. Appl..
[13] Maoguo Gong,et al. An efficient negative selection algorithm with further training for anomaly detection , 2012, Knowl. Based Syst..
[14] Francisco Viveros Jiménez,et al. An adaptive single-point algorithm for global numerical optimization , 2014, Expert Syst. Appl..
[15] Dipankar Dasgupta,et al. Artificial Immune Systems in Intrusion Detection , 2005 .
[16] Zhou Ji,et al. V-detector: An efficient negative selection algorithm with "probably adequate" detector coverage , 2009, Inf. Sci..
[17] Andries Petrus Engelbrecht,et al. Application of the feature-detection rule to the Negative Selection Algorithm , 2013, Expert Syst. Appl..
[18] Dipankar Dasgupta,et al. An evolutionary approach to generate fuzzy anomaly (attack) signatures , 2003, IEEE Systems, Man and Cybernetics SocietyInformation Assurance Workshop, 2003..
[19] Gregg H. Gunsch,et al. An artificial immune system architecture for computer security applications , 2002, IEEE Trans. Evol. Comput..
[20] D. Wong,et al. Negative Selection Algorithm for Aircraft Fault Detection , 2004, ICARIS.
[21] Li Tao,et al. A self-adaptive negative selection algorithm used for anomaly detection , 2009 .
[22] Claudia Eckert,et al. Is negative selection appropriate for anomaly detection? , 2005, GECCO '05.
[23] Bo Wang,et al. The machine abnormal degree detection method based on SVDD and negative selection mechanism , 2013 .
[24] Fernando Niño,et al. Recent Advances in Artificial Immune Systems: Models and Applications , 2011, Appl. Soft Comput..
[25] Fabio A. González,et al. An immunity-based technique to characterize intrusions in computer networks , 2002, IEEE Trans. Evol. Comput..
[26] Fabio A. González,et al. An Imunogenetic Technique To Detect Anomalies In Network Traffic , 2002, GECCO.
[27] Dong Li,et al. A negative selection algorithm with online adaptive learning under small samples for anomaly detection , 2015, Neurocomputing.