Revisiting Negative Selection Algorithms
暂无分享,去创建一个
[1] Fabio A. González,et al. A Randomized Real-Valued Negative Selection Algorithm , 2003, ICARIS.
[2] Zhou Ji,et al. Real-Valued Negative Selection Algorithm with Variable-Sized Detectors , 2004, GECCO.
[3] Wenjian Luo,et al. A Heuristic Detector Generation Algorithm for Negative Selection Algorithm with Hamming Distance Partial Matching Rule , 2006, ICARIS.
[4] Fabio A. González,et al. An immunity-based technique to characterize intrusions in computer networks , 2002, IEEE Trans. Evol. Comput..
[5] Slawomir T. Wierzchon,et al. Discriminative power of the receptors activated by k-contiguous bits rule , 2000 .
[6] David E. Goldberg,et al. FOX-GA: A Genetic Algorithm for Generating and Analyzing Battlefield Courses of Action , 1999, Evolutionary Computation.
[7] Patrik D'haeseleer,et al. An immunological approach to change detection: theoretical results , 1996, Proceedings 9th IEEE Computer Security Foundations Workshop.
[8] Zhou Ji,et al. Artificial immune system (AIS) research in the last five years , 2003, The 2003 Congress on Evolutionary Computation, 2003. CEC '03..
[9] Rogério de Lemos,et al. Negative Selection: How to Generate Detectors , 2002 .
[10] Dipankar Dasgupta,et al. An Immunogenetic Approach to Spectra Recognition , 1999, GECCO.
[11] Honghua Dai,et al. Constructing Detectors in Schema Complementary Space for Anomaly Detection , 2004, GECCO.
[12] Stephanie Forrest,et al. Architecture for an Artificial Immune System , 2000, Evolutionary Computation.
[13] Rui Vilela Mendes,et al. Using immunology principles for fault detection , 2003, IEEE Trans. Ind. Electron..
[14] Paul Helman,et al. The Crossover Closure and Partial Match Detection , 2003, ICARIS.
[15] Fabio A. González,et al. Anomaly Detection Using Real-Valued Negative Selection , 2003, Genetic Programming and Evolvable Machines.
[16] Zhou Ji,et al. Applicability issues of the real-valued negative selection algorithms , 2006, GECCO '06.
[17] Stephanie Forrest,et al. Coverage and Generalization in an Artificial Immune System , 2002, GECCO.
[18] Peter J. Bentley,et al. Immune Memory in the Dynamic Clonal Selection Algorithm , 2002 .
[19] H. Dai,et al. Applying both positive and negative selection to supervised learning for anomaly detection , 2005, GECCO '05.
[20] 大樹 若山. SCIS & ISIS 2004 (Joint 2nd International Conference on Soft Computing and Intelligent Systems and 5th International Symposium on Advanced Intelligent Systems)報告 , 2004 .
[21] Alex Alves Freitas,et al. Revisiting the Foundations of Artificial Immune Systems: A Problem-Oriented Perspective , 2003, ICARIS.
[22] Marc Ebner,et al. On The Use Of Negative Selection In An Artificial Immune System , 2002, GECCO.
[23] Paul Helman,et al. On-line Negative Databases , 2004, Int. J. Unconv. Comput..
[24] Paul Helman,et al. An immunological approach to change detection: algorithms, analysis and implications , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[25] David W. Corne,et al. An Investigation of the Negative Selection Algorithm for Fault Detection in Refrigeration Systems , 2003, ICARIS.
[26] Costas Tsatsoulis,et al. Determining Object Safety Using a Multiagent, Collaborative System , 2008, 2008 Second IEEE International Conference on Self-Adaptive and Self-Organizing Systems Workshops.
[27] D. Dasgupta,et al. Combining negative selection and classification techniques for anomaly detection , 2002, Proceedings of the 2002 Congress on Evolutionary Computation. CEC'02 (Cat. No.02TH8600).
[28] Gregg H. Gunsch,et al. An artificial immune system architecture for computer security applications , 2002, IEEE Trans. Evol. Comput..
[29] Senhua Yu,et al. MILA - Multilevel Immune Learning Algorithm , 2003, GECCO.
[30] Gilbert L. Peterson,et al. An evolutionary algorithm to generate hyper-ellipsoid detectors for negative selection , 2005, GECCO '05.
[31] Zhou Ji,et al. Estimating the detector coverage in a negative selection algorithm , 2005, GECCO '05.
[32] Claudia Eckert,et al. Is negative selection appropriate for anomaly detection? , 2005, GECCO '05.
[33] Dipankar Dasgupta,et al. An Overview of Artificial Immune Systems and Their Applications , 1993 .
[34] Peter J. Bentley,et al. An evaluation of negative selection in an artificial immune system for network intrusion detection , 2001 .
[35] Xiang Zhang,et al. Vector computer 757 , 1986, Journal of Computer Science and Technology.
[36] Dipankar Dasgupta,et al. An Anomaly Entection Algorithm Inspired by the Immune Syste , 1999 .
[37] Fabio A. González,et al. Discriminating and visualizing anomalies using negative selection and self-organizing maps , 2005, GECCO '05.
[38] Alan S. Perelson,et al. Self-nonself discrimination in a computer , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.
[39] Claudia Eckert,et al. The Link between r-contiguous Detectors and k-CNF Satisfiability , 2006, 2006 IEEE International Conference on Evolutionary Computation.
[40] Richard Wheeler,et al. The Effect of Antibody Morphology on Non-self Detection , 2003, ICARIS.
[41] Xiao Zhi Gao,et al. Re-editing and Censoring of Detectors in Negative Selection Algorithm , 2009, Int. J. Comput. Intell. Syst..
[42] Claudia Eckert,et al. On Permutation Masks in Hamming Negative Selection , 2006, ICARIS.
[43] P. Helman,et al. A formal framework for positive and negative detection schemes , 2004, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).
[44] Fabio A. González,et al. The Effect of Binary Matching Rules in Negative Selection , 2003, GECCO.
[45] Stephanie Forrest,et al. An immunological model of distributed detection and its application to computer security , 1999 .
[46] Young-Il Kim,et al. Complementary Dual Detectors for Effective Classification , 2003, ICARIS.
[47] Fernando Niño,et al. A Framework for Evolving Multi-Shaped Detectors in Negative Selection , 2007, 2007 IEEE Symposium on Foundations of Computational Intelligence.
[48] Claudia Eckert,et al. A Comparative Study of Real-Valued Negative Selection to Statistical Anomaly Detection Techniques , 2005, ICARIS.
[49] Lois Boggess,et al. Non-Euclidean distance measures in AIRS, an artificial immune classification system , 2004, Proceedings of the 2004 Congress on Evolutionary Computation (IEEE Cat. No.04TH8753).
[50] Peter Ross,et al. Studies on the Implications of Shape-Space Models for Idiotypic Networks , 2004, ICARIS.
[51] Simon M. Garrett,et al. How Do We Evaluate Artificial Immune Systems? , 2005, Evolutionary Computation.
[52] A. Perelson,et al. Predicting the size of the T-cell receptor and antibody combining region from consideration of efficient self-nonself discrimination. , 1993, Proceedings of the National Academy of Sciences of the United States of America.
[53] Emma Hart,et al. Not All Balls Are Round: An Investigation of Alternative Recognition-Region Shapes , 2005, ICARIS.
[54] D. Wong,et al. Negative Selection Algorithm for Aircraft Fault Detection , 2004, ICARIS.
[55] Claudia Eckert,et al. An Investigation of R-Chunk Detector Generation on Higher Alphabets , 2004, GECCO.