Towards a Hybrid Immune Algorithm Based on Danger Theory for Database Security
暂无分享,去创建一个
[2] Lu Feng,et al. Towards accurate intrusion detection based on improved clonal selection algorithm , 2017, Multimedia Tools and Applications.
[3] Thomas Pradeu,et al. Towards a General Theory of Immunity? , 2017, Trends in immunology.
[4] Chung-Ming Ou. Host-based Intrusion Detection Systems Inspired by Machine Learning of Agent-Based Artificial Immune Systems , 2019, 2019 IEEE International Symposium on INnovations in Intelligent SysTems and Applications (INISTA).
[5] Shivashankar B. Nair,et al. An Immuno-inspired Distributed Artificial Classification System , 2019, SocProS.
[6] Tarek N. Saadawi,et al. Distributed Network Intrusion Detection Systems: An Artificial Immune System Approach , 2016, 2016 IEEE First International Conference on Connected Health: Applications, Systems and Engineering Technologies (CHASE).
[7] Marin Emilov Pamukov,et al. Application of artificial immune systems for the creation of IoT intrusion detection systems , 2017, 2017 9th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS).
[8] Yasir Abdelgadir Mohamed,et al. Implementation of IDS with response for securing MANETs , 2010, 2010 International Symposium on Information Technology.
[9] Ruirui Zhang,et al. Study of Immune-Based Intrusion Detection Technology in Wireless Sensor Networks , 2017, Arabian Journal for Science and Engineering.
[10] Salah Al-Sharhan,et al. ARTIFICIAL IMMUNE SYSTEMS - MODELS, ALGORITHMS AND APPLICATIONS , 2010 .
[11] Xiangchun Li. Progress in Mine Safety Science and Engineering II , 2014 .
[12] Manuel Eduardo Correia,et al. An Artificial Immune System for Temporal Anomaly Detection Using Cell Activation Thresholds and Clonal Size Regulation with Homeostasis , 2009, 2009 International Joint Conference on Bioinformatics, Systems Biology and Intelligent Computing.
[13] Julie Greensmith,et al. The Dendritic Cell Algorithm for Intrusion Detection , 2013, Biologically Inspired Networking and Sensing.
[14] Azuan Ahmad,et al. CloudIDS: Cloud Intrusion Detection Model Inspired by Dendritic Cell Mechanism , 2017, Int. J. Commun. Networks Inf. Secur..
[15] Zvi Grossman,et al. Immunological Paradigms, Mechanisms, and Models: Conceptual Understanding Is a Prerequisite to Effective Modeling , 2019, Front. Immunol..
[16] Tao Yang,et al. A Quick Negative Selection Algorithm for One-Class Classification in Big Data Era , 2017 .
[17] Elsayed M. Zaki,et al. Artificial immune system based neural networks for solving multi-objective programming problems , 2010 .
[18] Yashwant K. Malaiya,et al. A consolidated approach for estimation of data security breach costs , 2016, 2016 2nd International Conference on Information Management (ICIM).
[19] Paul Kim,et al. Artificial Immune System (AIS) Based Intrusion Detection System (IDS) for Smart Grid Advanced Metering Infrastructure (AMI) Networks , 2018 .
[21] Vladimir I. Vasilyev,et al. Immune model based approach for network intrusion detection , 2010, SIN.
[22] Fabio A. González,et al. The Effect of Binary Matching Rules in Negative Selection , 2003, GECCO.
[24] Vladimir Poulkov,et al. Multiple negative selection algorithm: Improving detection error rates in IoT intrusion detection systems , 2017, 2017 9th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS).
[25] Rozaida Ghazali,et al. Negative Selection Algorithm: A Survey on the Epistemology of Generating Detectors , 2013, DaEng.
[26] Kalpana Kumari,et al. Intrusion Detection Technique based on Dendritic Cell Algorithm and Dempster Belief Theory , 2012 .
[27] Krzysztof Wawryn,et al. A Human Immunity Inspired Algorithm to Detect Infections in a Computer Program , 2019, 2019 MIXDES - 26th International Conference "Mixed Design of Integrated Circuits and Systems".
[28] Ruirui Zhang,et al. Intrusion Detection in Wireless Sensor Networks with an Improved NSA Based on Space Division , 2019, J. Sensors.
[29] Abbas Jamalipour,et al. On the negative selection and the danger theory inspired security for heterogeneous networks , 2012, IEEE Wireless Communications.
[30] Helena Szczerbicka,et al. ARTIFICIAL IMMUNE SYSTEMS IN THE CONTEXT OF MISBEHAVIOR DETECTION , 2008, Cybern. Syst..
[31] Sung-Bae Cho,et al. A convolutional neural-based learning classifier system for detecting database intrusion via insider attack , 2020, Inf. Sci..
[32] Sharmila Subudhi,et al. Application of OPTICS and ensemble learning for Database Intrusion Detection , 2019, J. King Saud Univ. Comput. Inf. Sci..
[33] Jasvinder Pal Singh,et al. A Review: AIS Based Intrusion Detection System , 2013 .
[34] Xiaohua Li,et al. An Immune Based Relational Database Intrusion Detection Algorithm , 2009, 2009 Ninth International Conference on Hybrid Intelligent Systems.
[35] A. Bakar,et al. AN IMPROVED ARTIFICIAL DENDRITE CELL ALGORITHM FOR ABNORMAL SIGNAL DETECTION 1Mohamad , 2017 .
[36] Suad Mohammed Othman,et al. Survey on Intrusion Detection System Types , 2018 .
[37] Dipankar Dasgupta,et al. A study of artificial immune systems applied to anomaly detection , 2003 .
[38] Sandeep K. Shukla,et al. Verity: Blockchains to Detect Insider Attacks in DBMS , 2019, ArXiv.
[39] Fernando P. A. Lima,et al. Artificial Immune System with Negative Selection Applied to Facial Biometry Based on Binary Pattern Characteristics , 2019, Int. J. Artif. Intell. Tools.
[40] Ayman Mohamed Mostafa,et al. Securing Relational Databases with an Artificial Immunity Features , 2013 .
[41] Pabitra Mohan Khilar,et al. Immune Inspired Fault Diagnosis in Wireless Sensor Network , 2020 .
[42] Tao Li,et al. A Social Network Water Army Detection Model based on Artificial Immunity , 2019, Journal of Physics: Conference Series.
[43] H. Veiga-Fernandes,et al. The S(c)ensory Immune System Theory. , 2017, Trends in immunology.
[44] Ali Selamat,et al. A Swarm Negative Selection Algorithm for Email Spam Detection , 2015 .
[45] Veeramreddy Jyothsna,et al. Anomaly-Based Intrusion Detection System , 2019, Computer and Network Security.
[46] S. Chikhi,et al. Negative Selection Algorithm : Recent Improvements and Its Application in Intrusion Detection System , 2017 .
[47] Ying Tan,et al. An Immune Concentration Based Virus Detection Approach Using Particle Swarm Optimization , 2010, ICSI.
[48] Jun Fu,et al. Bait a Trap: Introducing Natural Killer Cells to Artificial Immune System for Spyware Detection , 2012, ICARIS.
[49] Peter J. Bentley,et al. An evaluation of negative selection in an artificial immune system for network intrusion detection , 2001 .
[50] Kui Zhang,et al. A Danger Model Based Anomaly Detection Method for Wireless Sensor Networks , 2009, 2009 Second International Symposium on Knowledge Acquisition and Modeling.
[51] Ayman Mohamed Mostafa,et al. Design and implementation of multi-layer policies for database security , 2013 .
[52] Mohammed Bouhorma,et al. MANET security: An intrusion detection system based on the combination of Negative Selection and danger theory concepts , 2014, 2014 International Conference on Next Generation Networks and Services (NGNS).
[53] Yonghong Chen,et al. An Improved Dendritic Cell Algorithm Based Intrusion Detection System for Wireless Sensor Networks , 2017 .
[54] Manuel Eduardo Correia,et al. TAT-NIDS: An Immune-Based Anomaly Detection Architecture for Network Intrusion Detection , 2008, IWPACBB.
[55] Xin Lin,et al. Recent advances in clonal selection algorithms and applications , 2017, 2017 IEEE Symposium Series on Computational Intelligence (SSCI).
[56] Jia Chen,et al. Definition of Danger Signal in Artificial Immune System with Cloud Method , 2008, 2008 Fourth International Conference on Natural Computation.
[57] Peter Wlodarczak. Cyber Immunity - A Bio-Inspired Cyber Defense System , 2017, IWBBIO.
[58] Fuyong Zhang,et al. Integrated Negative Selection Algorithm and Positive Selection Algorithm for malware detection , 2016, 2016 International Conference on Progress in Informatics and Computing (PIC).
[59] Fang Wang,et al. A niching negative selective genetic algorithm for self-nonself discrimination in a computer , 2002, Proceedings. International Conference on Machine Learning and Cybernetics.
[60] Ruirui Zhang,et al. An Intrusion Detection Method Based on Changes of Antibody Concentration in Immune Response , 2019, J. Inf. Process. Syst..
[62] Iqbal Gondal,et al. Survey of intrusion detection systems: techniques, datasets and challenges , 2019, Cybersecurity.
[63] Samuel Kounev,et al. Efficient and Effective Ransomware Detection in Databases , 2018 .
[64] Tao Li,et al. A New Intrusion Detection Method Based on Antibody Concentration , 2009, ICIC.
[65] Kamalanathan Kandasamy,et al. Database Intrusion Detection System Using Octraplet and Machine Learning , 2018, 2018 Second International Conference on Inventive Communication and Computational Technologies (ICICCT).
[66] Zhou Ji,et al. Revisiting Negative Selection Algorithms , 2007, Evolutionary Computation.
[67] Sung-Bae Cho,et al. Genetic Algorithm-Based Deep Learning Ensemble for Detecting Database Intrusion via Insider Attack , 2019, HAIS.
[68] Abdelouahid Derhab,et al. NSNAD: negative selection-based network anomaly detection approach with relevant feature subset , 2019, Neural Computing and Applications.
[69] Salim Chikhi,et al. Clustered negative selection algorithm and fruit fly optimization for email spam detection , 2017, Journal of Ambient Intelligence and Humanized Computing.
[70] Xiao Zhi Gao,et al. Negative Selection Algorithm with Applications in Motor Fault Detection , 2008, Soft Computing Applications in Industry.
[71] Hong Qiao,et al. Negative selection based immune optimization , 2007, Adv. Eng. Softw..
[72] Ruslan Medzhitov,et al. Disease Tolerance as a Defense Strategy , 2012, Science.
[73] Wenjian Luo,et al. PTS-RNSA: A Novel Detector Generation Algorithm for Real-Valued Negative Selection Algorithm , 2009, 2009 International Joint Conference on Bioinformatics, Systems Biology and Intelligent Computing.
[74] Jean-Yves Le Boudec,et al. An Artificial Immune System for Misbehavior Detection in Mobile Ad-Hoc Networks with Virtual Thymus, Clustering, Danger Signal and Memory Detectors , 2004, Int. J. Unconv. Comput..
[75] Shahaboddin Shamshirband,et al. Co-FAIS: Cooperative fuzzy artificial immune system for detecting intrusion in wireless sensor networks , 2014, J. Netw. Comput. Appl..
[76] Virendra Barot,et al. A framework for database intrusion detection system , 2016, 2016 International Conference on Global Trends in Signal Processing, Information Computing and Communication (ICGTSPICC).
[77] Jorge Bernardino,et al. Approaches and Challenges in Database Intrusion Detection , 2014, SGMD.
[78] Ayman Mohamed Mostafa,et al. Design and Implementation of Extensible Service-Oriented Algorithms for Securing Relational Databases , 2013 .
[79] Mario Pavone,et al. DENSA: An effective negative selection algorithm with flexible boundaries for self-space and dynamic number of detectors , 2017, Eng. Appl. Artif. Intell..
[80] Suvasini Panigrahi,et al. Database Intrusion Detection Using Adaptive Resonance Network Theory Model , 2020 .
[81] A.O. Tarakanov,et al. Immunocomputing for intelligent intrusion detection , 2008, IEEE Computational Intelligence Magazine.
[82] Romilla Syed,et al. Enterprise reputation threats on social media: A case of data breach framing , 2019, J. Strateg. Inf. Syst..
[83] Yong Joon Park,et al. Web Application Intrusion Detection System for Input Validation Attack , 2008, 2008 Third International Conference on Convergence and Hybrid Information Technology.
[84] Fatemeh Barani,et al. BeeID: intrusion detection in AODV-based MANETs using artificial Bee colony and negative selection algorithms , 2012, ISC Int. J. Inf. Secur..
[85] D. Dasgupta. Artificial Immune Systems and Their Applications , 1998, Springer Berlin Heidelberg.
[86] Murad A. Rassam,et al. Artificial Immune Network Clustering approach for Anomaly Intrusion Detection , 2012 .
[87] Wanli Ma,et al. A Novel Spam Email Detection System Based on Negative Selection , 2009, 2009 Fourth International Conference on Computer Sciences and Convergence Information Technology.
[88] Suvasini Panigrahi,et al. A Hybrid Database Intrusion Detection Algorithm Using Swarm Intelligence and Radial Basis Function Network , 2019, HELIX.
[89] Wang Xiuying,et al. A Danger-Theory-Based Abnormal Traffic Detection Model in Local Network , 2008, 2008 International Conference on Computer Science and Software Engineering.
[90] Haidong Fu,et al. Design of a Four-Layer Model Based on Danger Theory and AIS for IDS , 2007, 2007 International Conference on Wireless Communications, Networking and Mobile Computing.
[91] Xin Xiao,et al. A Network Intrusion Detection Model Based on Artificial Immune , 2011 .
[92] Nacim YANES,et al. An Immunity-based Error Containment Algorithm for Database Intrusion Response Systems , 2019 .
[93] Aboul Ella Hassanien,et al. Negative Selection Approach Application in Network Intrusion Detection Systems , 2014, ArXiv.
[94] Alexander Krizhanovsky,et al. An Approach for Adaptive Intrusion Prevention Based on The Danger , 2007, The Second International Conference on Availability, Reliability and Security (ARES'07).
[95] Elisa Bertino,et al. Techniques and Systems for Anomaly Detection in Database Systems , 2018, PADG@ESORICS.
[96] Xufei Zheng,et al. The dual negative selection algorithm and its application for network anomaly detection , 2017, Int. J. Inf. Commun. Technol..
[97] Wanli Ma,et al. Negative Selection as a Means of Discovering Unknown Temporal Patterns , 2010 .
[98] Marin Emilov Pamukov,et al. Negative Selection and Neural Network Based Algorithm for Intrusion Detection in IoT , 2018, 2018 41st International Conference on Telecommunications and Signal Processing (TSP).
[99] Hao Jiang,et al. Three Branches of Negative Representation of Information: A Survey , 2018, IEEE Transactions on Emerging Topics in Computational Intelligence.
[100] Raed A. Alsaqour,et al. Using Dendritic Cell Algorithm to Detect the Resource Consumption Attack over MANET , 2011, ICSECS.
[101] S Arannya. Applications of Artificial Immune System: A Review , 2015, FOCS 2015.
[102] Inadyuti Dutt,et al. Survey of Bio-Inspired Techniques based on System Resource Usage in Intrusion Detection , 2020 .
[103] Yonghong Chen,et al. DIntrusion Detection in WSN with an Improved NSA Based on the DE-CMOP , 2017, KSII Trans. Internet Inf. Syst..
[104] Mário M. Freire,et al. Applications of artificial immune systems to computer security: A survey , 2017, J. Inf. Secur. Appl..
[105] Simon N. Foley,et al. Towards Modelling Insiders Behaviour as Rare Behaviour to Detect Malicious RDBMS Access , 2018, 2018 IEEE International Conference on Big Data (Big Data).
[106] Fang Liu,et al. Intrusion Detection Based on Immune Clonal Selection Algorithms , 2004, Australian Conference on Artificial Intelligence.
[107] Tao Li,et al. A real negative selection algorithm with evolutionary preference for anomaly detection , 2017 .
[108] Bharanidharan Shanmugam,et al. An Intelligent Spam Detection Model Based on Artificial Immune System , 2019, Inf..
[109] Alexander O. Tarakanov,et al. Immunocomputing Model of Intrusion Detection , 2003, MMM-ACNS.
[110] Sung-Bae Cho,et al. CNN-LSTM Neural Networks for Anomalous Database Intrusion Detection in RBAC-Administered Model , 2019, ICONIP.
[111] Alireza Osareh,et al. Distribution estimation based negative selection algorithm (DENSA) , 2015, 2015 International Workshop on Artificial Immune Systems (AIS).
[112] Julie Greensmith,et al. Sensing Danger: Innate Immunology for Intrusion Detection , 2007, Inf. Secur. Tech. Rep..
[113] Fernando Niño,et al. Recent Advances in Artificial Immune Systems: Models and Applications , 2011, Appl. Soft Comput..
[114] Sung-Bae Cho,et al. Applying accuracy-based LCS to detecting anomalous database access , 2018, GECCO.
[115] Xiaohong Yuan,et al. Applying Artificial Immune System for Intrusion Detection , 2018, 2018 IEEE Fourth International Conference on Big Data Computing Service and Applications (BigDataService).
[116] Min Hu,et al. A Novel Negative Selection Algorithm for Recognition Problems , 2015 .
[117] Lin Jia,et al. Negative Selection Algorithm Based on Antigen Density Clustering , 2020, IEEE Access.
[118] Manuel Eduardo Correia,et al. Towards an Immune-inspired Temporal Anomaly Detection Algorithm based on Tunable Activation Thresholds , 2009, BIOSIGNALS.
[119] Tao Li,et al. Augmented Negative Selection Algorithm with Complete Random Subspace Technique for Anomaly Detection , 2019, 2019 IEEE 2nd International Conference on Information and Computer Technologies (ICICT).
[120] Leandro Nunes de Castro,et al. Fundamentals of natural computing: an overview , 2007 .
[121] Samuel Kounev,et al. Hands Off my Database: Ransomware Detection in Databases through Dynamic Analysis of Query Sequences , 2019, ArXiv.
[122] Alireza Nowroozi,et al. A New Intrusion Detection System using the Improved Dendritic Cell Algorithm , 2020, Comput. J..
[123] Sarita Singh Bhadauria,et al. Intrusion Detection Using Negative Selection Based Neural Network Algorithm , 2019 .
[124] Daniyal M. Alghazzawi,et al. Artificial Immune Systems approaches to secure the internet of things: A systematic review of the literature and recommendations for future research , 2020, J. Netw. Comput. Appl..
[125] Wan Tang,et al. Avidity-model based clonal selection algorithm for network intrusion detection , 2010, 2010 IEEE 18th International Workshop on Quality of Service (IWQoS).
[126] Muhammad Zeeshan,et al. An Immunology Inspired Flow Control Attack Detection Using Negative Selection with R-Contiguous Bit Matching for Wireless Sensor Networks , 2015, Int. J. Distributed Sens. Networks.
[127] Simon N. Foley,et al. A Semantic Approach to Frequency Based Anomaly Detection of Insider Access in Database Management Systems , 2017, CRiSIS.
[128] Jing Zhang,et al. A Novel Multi-layered Immune Network Intrusion Detection Defense Model: MINID , 2013, J. Networks.
[129] Karim Abouelmehdi,et al. A survey of intrusion detection system , 2015, 2015 2nd World Symposium on Web Applications and Networking (WSWAN).
[130] Paulo B. Lourenço,et al. Deterministically generated negative selection algorithm for damage detection in civil engineering systems , 2019, Engineering Structures.
[131] Manuel Eduardo Correia,et al. Self Tolerance by Tuning T-Cell Activation: An Artificial Immune System for Anomaly Detection , 2010, BIONETICS.
[132] Mohammed Tarique,et al. Detection of SQL Injection Attacks: A Machine Learning Approach , 2019, 2019 International Conference on Electrical and Computing Technologies and Applications (ICECTA).
[133] Honghua Dai,et al. An Extended Negative Selection Algorithm for Anomaly Detection , 2004, PAKDD.
[134] Ling-Xi Peng,et al. Automated Intrusion Response System Algorithm with Danger Theory , 2014, 2014 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery.
[135] Thomas Stibor,et al. On the appropriateness of negative selection for anomaly detection and network intrusion detection , 2006 .
[136] S. Janakiraman,et al. An Intrusion Detection and Prevention System Using AIS—An NK Cell-Based Approach , 2018 .
[137] Manuel Eduardo Correia,et al. Tunable Immune Detectors for Behaviour-Based Network Intrusion Detection , 2011, ICARIS.
[138] Kamalrulnizam Abu Bakar,et al. Survey on Artificial Immune System as a Bio-inspired Technique for Anomaly Based Intrusion Detection Systems , 2010, 2010 International Conference on Intelligent Networking and Collaborative Systems.
[139] M. Antunes,et al. Temporal anomaly detection: an artificial immune approach based on T cell activation, clonal size regulation and homeostasis. , 2010, Advances in experimental medicine and biology.
[140] É. Vivier,et al. The discontinuity theory of immunity , 2016, Science Immunology.
[141] Tuan Dinh Le,et al. A Combination of Negative Selection Algorithm and Artificial Immune Network for Virus Detection , 2014, FDSE.
[142] Alan S. Perelson,et al. Self-nonself discrimination in a computer , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.
[143] Dipankar Dasgupta,et al. A biologically inspired password authentication system , 2009, CSIIRW '09.
[144] Mehmet Güçlü,et al. Comparisons on Intrusion Detection and Prevention Systems in Distributed Databases , 2019 .
[145] Swati Baburao Wankar. Implementation of Log Mining and Forensic Analysis for Database Intrusion Detection and Protection System , 2018 .
[146] Longzhi Yang,et al. Dendritic Cell Algorithm Enhancement Using Fuzzy Inference System for Network Intrusion Detection , 2019, 2019 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE).
[147] Na Wang,et al. Multi-agents Artificial Immune System (MAAIS) Inspired by Danger Theory for Anomaly Detection , 2007, 2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007).
[148] Suvasini Panigrahi,et al. Application of Deep Learning for Database Intrusion Detection , 2020 .
[149] Florin Popentiu Vladicescu,et al. Recent Advances in Artificial Immune Systems: Models, Algorithms, and Applications , 2017 .
[150] David Brosset,et al. A Taxonomy and Survey of Intrusion Detection System Design Techniques, Network Threats and Datasets , 2018, ArXiv.
[151] H. Dai,et al. Applying both positive and negative selection to supervised learning for anomaly detection , 2005, GECCO '05.
[152] Li Ma,et al. An Improved Dynamic Clonal Selection Algorithm Using Network Intrusion Detection , 2018, 2018 14th International Conference on Computational Intelligence and Security (CIS).
[153] Richa Adlakha,et al. Cyber Security Goal’s, Issue’s, Categorization & Data Breaches , 2019, 2019 International Conference on Machine Learning, Big Data, Cloud and Parallel Computing (COMITCon).
[154] Xufei Zheng,et al. Principle and Application of Dendritic Cell Algorithm for Intrusion Detection , .
[155] Tony White,et al. Developing an Immunity to Spam , 2003, GECCO.
[156] Behnam S. Arad,et al. Customized Intrusion Detection Based on a Database Audit Log , 2019, CATA.
[157] Jianhua Guo,et al. Collaborative RFID intrusion detection with an artificial immune system , 2011, Journal of Intelligent Information Systems.
[158] Zhengjun Liu,et al. An Improved Negative Selection Algorithm Based on Subspace Density Seeking , 2017, IEEE Access.
[159] Li Tao,et al. A method inspired from differential coefficient for calculating danger signals in Artificial Immune System , 2009, 2009 Asia-Pacific Conference on Computational Intelligence and Industrial Applications (PACIIA).
[160] Zhi Gang Wu,et al. Immune Danger Theory Based Model for SYN Flooding Attack Situation Awareness , 2011 .
[161] Hirotada Ohashi,et al. A negative selection algorithm for classification and reduction of the noise effect , 2009, Appl. Soft Comput..
[162] Reza Azmi,et al. MAIS-IDS: A distributed intrusion detection system using multi-agent AIS approach , 2014, Eng. Appl. Artif. Intell..
[163] He Yang,et al. Method for Presenting Danger Signals Based on System Balance , 2015 .
[164] Suhair Amer,et al. Danger Theory Concepts Improving Malware Detection of Intrusion Detection Systems That Uses Exact Graphs , 2015, 2015 International Conference on Computational Science and Computational Intelligence (CSCI).
[165] Lars Mathiassen,et al. Data Breach Risks and Resolutions: A Literature Synthesis , 2019, AMCIS.
[166] Ayman Mohamed Mostafa,et al. Interactive multi-layer policies for securing relational databases , 2012, International Conference on Information Society (i-Society 2012).
[167] Fabio A. González,et al. A Randomized Real-Valued Negative Selection Algorithm , 2003, ICARIS.
[168] Suvasini Panigrahi,et al. Role of Soft Outlier Analysis in Database Intrusion Detection , 2020 .
[169] Ranjit Singh,et al. False Positive Analysis of Software Vulnerabilities Using Machine Learning , 2018, 2018 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM).
[170] Raji Ramachandran,et al. Anomaly Detection in Role Administered Relational Databases — A Novel Method , 2018, 2018 International Conference on Advances in Computing, Communications and Informatics (ICACCI).
[171] Anazida Zainal,et al. Intrusion Detection System Using Unsupervised Immune Network Clustering with Reduced Features , 2010, SOCO 2010.
[172] Rajni Jindal,et al. A survey on database intrusion detection: approaches, challenges and application , 2019 .
[173] Dong Li,et al. Negative selection algorithm with constant detectors for anomaly detection , 2015, Appl. Soft Comput..
[174] Bernardete Ribeiro,et al. A Hybrid AIS-SVM Ensemble Approach for Text Classification , 2011, ICANNGA.
[175] Chenggong Zhang,et al. A danger theory inspired artificial immune algorithm for on-line supervised two-class classification problem , 2010, Neurocomputing.
[176] Fengqi Yu,et al. Immunity-based intrusion detection for wireless sensor networks , 2008, 2008 IEEE International Joint Conference on Neural Networks (IEEE World Congress on Computational Intelligence).
[177] Gang Chen,et al. An Immunity-Based Intrusion Detection Solution for Database Systems , 2005, WAIM.
[178] Julie Greensmith,et al. Detecting Danger: The Dendritic Cell Algorithm , 2010, ArXiv.
[179] Tarek N. Saadawi,et al. Detecting Denial of Service Attacks Using a Combination of Dendritic Cell Algorithm and the Negative Selection Algorithm , 2017, 2017 IEEE International Conference on Smart Cloud (SmartCloud).
[180] Ali Selamat,et al. Negative selection algorithm in artificial immune system for spam detection , 2011, 2011 Malaysian Conference in Software Engineering.
[181] Vishwa Teja Alaparthy,et al. A Multi-Level Intrusion Detection System for Wireless Sensor Networks Based on Immune Theory , 2018, IEEE Access.
[182] Jonathan Timmis,et al. Application Areas of AIS: The Past, The Present and The Future , 2005, ICARIS.
[183] Javaid Iqbal,et al. Artificial Immune System–Negative Selection Classification Algorithm (NSCA) for Four Class Electroencephalogram (EEG) Signals , 2018, Front. Hum. Neurosci..
[184] Rogério de Lemos,et al. Negative Selection: How to Generate Detectors , 2002 .
[185] Julie Greensmith,et al. Introducing Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomoly Detection , 2005, ICARIS.