An Introduction to Artificial Immune Systems

[1]  Jonathan Timmis,et al.  Modelling the Tunability of Early T Cell Signalling Events , 2008, ICARIS.

[2]  Paul S. Andrews,et al.  Alternative Inspiration For Artificial Immune Systems: Exploiting Cohen’s Cognitive Immune Model , 2007 .

[3]  Jonathan Timmis,et al.  A resource limited artificial immune system for data analysis , 2001, Knowl. Based Syst..

[4]  Jonathan Timmis,et al.  A Computational Model of Degeneracy in a Lymph Node , 2006, ICARIS.

[5]  Julie Greensmith,et al.  Dendritic Cells for Anomaly Detection , 2006, 2006 IEEE International Conference on Evolutionary Computation.

[6]  Mark James Neal,et al.  Meta-stable Memory in an Artificial Immune Network , 2003, ICARIS.

[7]  Julie Greensmith,et al.  Articulation and Clarification of the Dendritic Cell Algorithm , 2006, ICARIS.

[8]  Fabio A. González,et al.  A comparative analysis of artificial immune network models , 2005, GECCO '05.

[9]  Alex Alves Freitas,et al.  WAIRS: improving classification accuracy by weighting attributes in the AIRS classifier , 2007, 2007 IEEE Congress on Evolutionary Computation.

[10]  Jonathan Timmis,et al.  "Going Back to our Roots": Second Generation Biocomputing , 2005, Int. J. Unconv. Comput..

[11]  Julie Greensmith,et al.  Two Ways to Grow Tissue for Artificial Immune Systems , 2005, ICARIS.

[12]  P. Matzinger Tolerance, danger, and the extended family. , 1994, Annual review of immunology.

[13]  Armando M. Leite da Silva,et al.  A Gradient-Based Artificial Immune System Applied to Optimal Power Flow Problems , 2007, ICARIS.

[14]  Iain Bate,et al.  Applying artificial immune systems to real-time embedded systems , 2007, 2007 IEEE Congress on Evolutionary Computation.

[15]  Jonathan Timmis,et al.  On Immune Inspired Homeostasis for Electronic Systems , 2007, ICARIS.

[16]  Julie Greensmith,et al.  Introducing Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomoly Detection , 2005, ICARIS.

[17]  Jonathan Timmis,et al.  Artificial Immune Recognition System (AIRS): An Immune-Inspired Supervised Learning Algorithm , 2004, Genetic Programming and Evolvable Machines.

[18]  Jonathan Timmis,et al.  Immune Inspired Somatic Contiguous Hypermutation for Function Optimisation , 2003, GECCO.

[19]  Hugues Bersini,et al.  Immune System Modeling: The OO Way , 2006, ICARIS.

[20]  Peter J. Bentley,et al.  Immune Memory in the Dynamic Clonal Selection Algorithm , 2002 .

[21]  Leandro Nunes de Castro,et al.  aiNet: An Artificial Immune Network for Data Analysis , 2002 .

[22]  Stephanie Forrest,et al.  Infect Recognize Destroy , 1996 .

[23]  Jonathan Timmis,et al.  Adaptable Lymphocytes for Artificial Immune Systems , 2008, ICARIS.

[24]  Alex Alves Freitas,et al.  A Danger Theory Inspired Approach to Web Mining , 2003, ICARIS.

[25]  Peter Ross,et al.  Studies on the Implications of Shape-Space Models for Idiotypic Networks , 2004, ICARIS.

[26]  Claudia Eckert,et al.  Is negative selection appropriate for anomaly detection? , 2005, GECCO '05.

[27]  Jonathan Timmis,et al.  Inspiration for the Next Generation of Artificial Immune Systems , 2005, ICARIS.

[28]  Ralph Johnson,et al.  design patterns elements of reusable object oriented software , 2019 .

[29]  Hugues Bersini,et al.  Artificial Immune Systems: 5th International Conference, ICARIS 2006, Oeiras, Portugal, September 4-6, 2006, Proceedings (Lecture Notes in Computer Science) , 2006 .

[30]  Jonathan Timmis,et al.  An interdisciplinary perspective on artificial immune systems , 2008, Evol. Intell..

[31]  P. Matzinger The Danger Model: A Renewed Sense of Self , 2002, Science.

[32]  Leandro Nunes de Castro,et al.  Artificial Immune Systems: A New Computational Approach , 2002 .

[33]  G. Weisbuch,et al.  Immunology for physicists , 1997 .

[34]  Emma Hart,et al.  Analysis of a Growth Model for Idiotypic Networks , 2006, ICARIS.

[35]  Gérard Weisbuch,et al.  Control of the immune response , 1989 .

[36]  G. Oster,et al.  Theoretical studies of clonal selection: minimal antibody repertoire size and reliability of self-non-self discrimination. , 1979, Journal of theoretical biology.

[37]  Rebecca Cann,et al.  Going back to our roots , 2003, Nature.

[38]  Riccardo Poli,et al.  Genetic and Evolutionary Computation , 2006, Intelligenza Artificiale.

[39]  Alan S. Perelson,et al.  The immune system, adaptation, and machine learning , 1986 .

[40]  Simon M. Garrett,et al.  How Do We Evaluate Artificial Immune Systems? , 2005, Evolutionary Computation.

[41]  P. Helman,et al.  A formal framework for positive and negative detection schemes , 2004, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).

[42]  Uwe Aickelin,et al.  libtissue - implementing innate immunity , 2006, 2006 IEEE International Conference on Evolutionary Computation.

[43]  Paul S. Andrews,et al.  A Beginners Guide to Artificial Immune Systems , 2007 .

[44]  Brian Henderson,et al.  A Stochastic Model of the Interleukin (IL)-1 beta Network , 2008, ICARIS.

[45]  Fabio A. González,et al.  Anomaly Detection Using Real-Valued Negative Selection , 2003, Genetic Programming and Evolvable Machines.

[46]  Kendall Scott,et al.  UML distilled - a brief guide to the Standard Object Modeling Language (2. ed.) , 2000, notThenot Addison-Wesley object technology series.

[47]  Emma Hart,et al.  Not All Balls Are Round: An Investigation of Alternative Recognition-Region Shapes , 2005, ICARIS.

[48]  Fernando José Von Zuben,et al.  A Hierarchical Immune Network Applied to Gene Expression Data , 2004, ICARIS.

[49]  Andrew Hone,et al.  Modelling a cytokine network (Special session: Foundations of Artificial Immune Systems) , 2007, 2007 IEEE Symposium on Foundations of Computational Intelligence.

[50]  Stephanie Forrest,et al.  Modeling Influenza Viral Dynamics in Tissue , 2006, ICARIS.

[51]  Fernando José Von Zuben,et al.  Learning and optimization using the clonal selection principle , 2002, IEEE Trans. Evol. Comput..

[52]  Steven H. Kleinstein,et al.  Simulating the immune system , 2000, Comput. Sci. Eng..

[53]  Vincenzo Cutello,et al.  Exploring the Capability of Immune Algorithms: A Characterization of Hypermutation Operators , 2004, ICARIS.

[54]  I. Cohen Tending Adam's Garden: Evolving the Cognitive Immune Self , 2004 .

[55]  Francisco C. Santos,et al.  Tolerance vs Intolerance: How Affinity Defines Topology in an Idiotypic Network , 2006, ICARIS.

[56]  Alex Alves Freitas,et al.  Revisiting the Foundations of Artificial Immune Systems for Data Mining , 2007, IEEE Transactions on Evolutionary Computation.

[57]  Jan Feyereisl,et al.  Don't Touch Me, I'm Fine: Robot Autonomy Using an Artificial Innate Immune System , 2006, ICARIS.

[58]  Jerne Nk Towards a network theory of the immune system. , 1974 .

[59]  Uwe Aickelin,et al.  Towards a Conceptual Framework for Innate Immunity , 2005, ICARIS.

[60]  D. Harel,et al.  Toward rigorous comprehension of biological complexity: modeling, execution, and visualization of thymic T-cell maturation. , 2003, Genome research.

[61]  Jonathan Timmis,et al.  Empirical Investigation of an Artificial Cytokine Network , 2008, ICARIS.

[62]  Vincenzo Cutello,et al.  Artificial Immune Systems: Third International Conference, ICARIS 2004, Catania, Sicily, Italy, September 13-16, 2004, Proceedings (Lecture Notes in Computer Science) , 2004 .

[63]  Irun R. Cohen,et al.  Real and artificial immune systems: computing the state of the body , 2007, Nature Reviews Immunology.

[64]  Christian Jacob,et al.  Immunity Through Swarms: Agent-Based Simulations of the Human Immune System , 2004, ICARIS.

[65]  Jonathan Timmis,et al.  Theoretical advances in artificial immune systems , 2008, Theor. Comput. Sci..

[66]  Peter J. Bentley,et al.  Towards an artificial immune system for network intrusion detection: an investigation of dynamic clonal selection , 2002, Proceedings of the 2002 Congress on Evolutionary Computation. CEC'02 (Cat. No.02TH8600).

[67]  Jonathan Timmis,et al.  Artificial Immune Systems: A New Computational Intelligence Approach , 2003 .

[68]  Uwe Aickelin,et al.  The Danger Theory and Its Application to Artificial Immune Systems , 2008, ArXiv.

[69]  Alex A. Freitas,et al.  A Danger Theory Approach to Web Mining , 2003 .

[70]  Simon M. Garrett,et al.  Modelling Immune Memory for Prediction and Computation , 2004, ICARIS.

[71]  Ben Paechter,et al.  Boosting the Immune System , 2008, ICARIS.

[72]  Leandro Nunes de Castro,et al.  The Clonal Selection Algorithm with Engineering Applications 1 , 2000 .

[73]  Susan Stepney,et al.  A Generic Framework for Population-Based Algorithms, Implemented on Multiple FPGAs , 2005, ICARIS.

[74]  Jonathan Timmis,et al.  Artificial immune systems—today and tomorrow , 2007, Natural Computing.

[75]  Alan S. Perelson,et al.  Self-nonself discrimination in a computer , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.

[76]  Walmir M. Caminhas,et al.  Regulatory T Cells: Inspiration for Artificial Immune Systems , 2007, ICARIS.

[77]  Jonathan Timmis,et al.  In Silico Immunology , 2007 .

[78]  Vincenzo Cutello,et al.  Clonal Selection Algorithms: A Comparative Case Study Using Effective Mutation Potentials , 2005, ICARIS.

[79]  Vincenzo Cutello,et al.  An immune algorithm with hyper-macromutations for the Dill's 2D hydrophobic-hydrophilic model , 2004, Proceedings of the 2004 Congress on Evolutionary Computation (IEEE Cat. No.04TH8753).

[80]  Jonathan Timmis,et al.  Application areas of AIS: The past, the present and the future , 2008, Appl. Soft Comput..