Artificial Dendritic Cells: Multi-faceted Perspectives
暂无分享,去创建一个
[1] Claudia Eckert,et al. On Permutation Masks in Hamming Negative Selection , 2006, ICARIS.
[2] Julie Greensmith,et al. Articulation and Clarification of the Dendritic Cell Algorithm , 2006, ICARIS.
[3] Stephanie Forrest,et al. An immunological model of distributed detection and its application to computer security , 1999 .
[4] Arthur M. Silverstein. Paul Ehrlich, archives and the history of immunology , 2005, Nature Immunology.
[5] Julie Greensmith,et al. The DCA: SOMe comparison , 2008, Evol. Intell..
[6] C. Janeway. Approaching the asymptote? Evolution and revolution in immunology. , 1989, Cold Spring Harbor symposia on quantitative biology.
[7] Tsau Young Lin,et al. Granular Computing , 2003, RSFDGrC.
[8] Witold Pedrycz,et al. Granular computing: an introduction , 2001, Proceedings Joint 9th IFSA World Congress and 20th NAFIPS International Conference (Cat. No. 01TH8569).
[9] Uwe Aickelin,et al. Danger Theory: The Link between AIS and IDS? , 2003, ICARIS.
[10] Julie Greensmith,et al. DCA for Bot Detection , 2008 .
[11] Graham Kendall,et al. Frequency analysis for dendritic cell population tuning , 2008, Evol. Intell..
[12] Julie Greensmith,et al. Further Exploration of the Dendritic Cell Algorithm: Antigen Multiplier and Time Windows , 2008, ICARIS.
[13] Peter J. Bentley,et al. An evaluation of negative selection in an artificial immune system for network intrusion detection , 2001 .
[14] Justin Balthrop. RIOT: A Responsive System for Mitigating Computer Network Epidemics and Attacks , 2005 .
[15] K. P. Murphy,et al. Janeway's immunobiology , 2007 .
[16] Julie Greensmith,et al. The Application of a Dendritic Cell Algorithm to a Robotic Classifier , 2007, ICARIS.
[17] Claudia Eckert,et al. Is negative selection appropriate for anomaly detection? , 2005, GECCO '05.
[18] Leandro Nunes de Castro,et al. Artificial Immune Systems: A New Computational Approach , 2002 .
[19] Uwe Aickelin,et al. libtissue - implementing innate immunity , 2006, 2006 IEEE International Conference on Evolutionary Computation.
[20] Fernando José Von Zuben,et al. Learning and optimization using the clonal selection principle , 2002, IEEE Trans. Evol. Comput..
[21] Alan S. Perelson,et al. Self-nonself discrimination in a computer , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.
[22] Gerold Schuler,et al. Immature, semi-mature and fully mature dendritic cells: which signals induce tolerance or immunity? , 2002, Trends in immunology.
[23] Julie Greensmith,et al. The dendritic cell algorithm , 2007 .
[24] Irun R. Cohen,et al. Real and artificial immune systems: computing the state of the body , 2007, Nature Reviews Immunology.
[25] Peter J. Bentley,et al. Danger Is Ubiquitous: Detecting Malicious Activities in Sensor Networks Using the Dendritic Cell Algorithm , 2006, ICARIS.
[26] Julie Greensmith,et al. The Deterministic Dendritic Cell Algorithm , 2008, ICARIS.
[27] P. Matzinger. Tolerance, danger, and the extended family. , 1994, Annual review of immunology.
[28] Zhou Ji,et al. Applicability issues of the real-valued negative selection algorithms , 2006, GECCO '06.