Immunological Computation: Theory and Applications

Over the last decade, the field of immunological computation has progressed slowly and steadily as a branch of computational intelligence. Immunological Computation: Theory and Applications presents up-to-date immunity-based computational techniques. After a brief review of fundamental immunology concepts, the book presents computational models based on the negative selection process that occurs in the thymus. It then examines immune networks, including continuous and discrete immune network models, clonal selection, hybrid models, and computational models based on danger theory. The book also discusses real-world applications for all of the models covered in each chapter.

[1]  Nikolay I. Nikolaev,et al.  Immune Network Dynamics for Inductive Problem Solving , 1998, PPSN.

[2]  P. Marrack,et al.  T cell tolerance by clonal elimination in the thymus , 1987, Cell.

[3]  Lydia Woods Schindler Understanding the Immune System , 1991 .

[4]  Koji Yamada,et al.  Immune algorithm for n-TSP , 1998, SMC'98 Conference Proceedings. 1998 IEEE International Conference on Systems, Man, and Cybernetics (Cat. No.98CH36218).

[5]  Gary B. Lamont,et al.  A retrovirus inspired algorithm for virus detection & optimization , 2006, GECCO.

[6]  Simon M. Garrett A Paratope Is Not an Epitope: Implications for Immune Network Models and Clonal Selection , 2003, ICARIS.

[7]  Andy M. Tyrrell,et al.  A hardware immune system for benchmark state machine error detection , 2002, Proceedings of the 2002 Congress on Evolutionary Computation. CEC'02 (Cat. No.02TH8600).

[8]  G. Parisi A simple model for the immune network. , 1990, Proceedings of the National Academy of Sciences of the United States of America.

[9]  Kazuyuki Mori,et al.  Adaptive scheduling system inspired by immune system , 1998, SMC'98 Conference Proceedings. 1998 IEEE International Conference on Systems, Man, and Cybernetics (Cat. No.98CH36218).

[10]  P. Matzinger Tolerance, danger, and the extended family. , 1994, Annual review of immunology.

[11]  Werner Dilger,et al.  Properties of the bersini experiment on self-assertion , 2006, GECCO '06.

[12]  Stephanie Forrest,et al.  Automated response using system-call delays , 2000 .

[13]  J. Whitton,et al.  An overview of antigen presentation and its central role in the immune response. , 1998, Current topics in microbiology and immunology.

[14]  M. Galek,et al.  Sztuczne systemy immunologiczne , 2005 .

[15]  Fernando José Von Zuben,et al.  An Immunological Filter for Spam , 2006, ICARIS.

[16]  J Faro,et al.  Studies on a recent class of network models of the immune system. , 1993, Journal of theoretical biology.

[17]  Paul Helman,et al.  Protecting data privacy through hard-to-reverse negative databases , 2007, International Journal of Information Security.

[18]  Jonathan Timmis,et al.  A Computational Model of Degeneracy in a Lymph Node , 2006, ICARIS.

[19]  S. Forrest,et al.  Immunology as Information Processing , 2001 .

[20]  Christian P. Robert,et al.  Monte Carlo Integration , 2010 .

[21]  Alan S. Perelson,et al.  The immune system, adaptation, and machine learning , 1986 .

[22]  Wei Gao,et al.  Fast immunized evolutionary programming , 2004, Proceedings of the 2004 Congress on Evolutionary Computation (IEEE Cat. No.04TH8753).

[23]  Guan-Chun Luh,et al.  Reactive Immune Network Based Mobile Robot Navigation , 2004, ICARIS.

[24]  Doheon Lee,et al.  Clonal Selection Algorithms for 6-DOF PID Control of Autonomous Underwater Vehicles , 2007, ICARIS.

[25]  D. J. Weatherall Genetic markers in human blood , 1969 .

[26]  O C Martin,et al.  Memory capacity in large idiotypic networks. , 1995, Bulletin of mathematical biology.

[27]  A S Perelson,et al.  Pattern formation in one- and two-dimensional shape-space models of the immune system. , 1992, Journal of theoretical biology.

[28]  I. Maclennan,et al.  T cells in the selection of germinal center B cells. , 1997, Chemical immunology.

[29]  Paul Helman,et al.  Enhancing Privacy through Negative Representations of Data , 2004 .

[30]  Rogério de Lemos,et al.  Negative Selection: How to Generate Detectors , 2002 .

[31]  Fernando Esponda Negative Surveys , 2006 .

[32]  Surya P. N. Singh,et al.  Immunology-directed methods for distributed robotics: a novel immunity-based architecture for robust control and coordination , 2002, SPIE Optics East.

[33]  Zhou Ji,et al.  Augmented negative selection algorithm with variable-coverage detectors , 2004, Proceedings of the 2004 Congress on Evolutionary Computation (IEEE Cat. No.04TH8753).

[34]  Hugues Bersini,et al.  Immune Idiotypic Network , 1996 .

[35]  Paul Helman,et al.  Negative representations of information , 2009, International Journal of Information Security.

[36]  Jun Chen,et al.  A Population Adaptive Based Immune Algorithm for Solving Multi-objective Optimization Problems , 2006, ICARIS.

[37]  F. Varela,et al.  Second generation immune networks. , 1991, Immunology today.

[38]  Gary B. Lamont,et al.  A distributed architecture for a self-adaptive computer virus immune system , 1999 .

[39]  Zhou Ji,et al.  Real-Valued Negative Selection Algorithm with Variable-Sized Detectors , 2004, GECCO.

[40]  E. Benjamini,et al.  Immunology: A Short Course , 1988 .

[41]  Fabio Freschi,et al.  Immune Procedure for Optimal Scheduling of Complex Energy Systems , 2006, ICARIS.

[42]  Jeffrey O. Kephart,et al.  A biologically inspired immune system for computers , 1994 .

[43]  M. Ferrarini,et al.  Human B cell populations , 1997 .

[44]  Zhou Ji,et al.  Applicability issues of the real-valued negative selection algorithms , 2006, GECCO '06.

[45]  Dipankar Dasgupta,et al.  Anomaly detection in multidimensional data using negative selection algorithm , 2002, Proceedings of the 2002 Congress on Evolutionary Computation. CEC'02 (Cat. No.02TH8600).

[46]  Fernando Niño,et al.  A Framework for Evolving Multi-Shaped Detectors in Negative Selection , 2007, 2007 IEEE Symposium on Foundations of Computational Intelligence.

[47]  Claudia Eckert,et al.  A Comparative Study of Real-Valued Negative Selection to Statistical Anomaly Detection Techniques , 2005, ICARIS.

[48]  Riccardo Poli,et al.  New ideas in optimization , 1999 .

[49]  Alan S. Perelson,et al.  Using Genetic Algorithms to Explore Pattern Recognition in the Immune System , 1993, Evolutionary Computation.

[50]  Dipankar Dasgupta,et al.  Parallel Search for Multi-Modal FunctionOptimization with Diversity and Learningof Immune Algorithm , 1999 .

[51]  Leandro Nunes de Castro,et al.  A Pruning Self-Organizing Algorithm to Select Centers of Radial Basis Function Neural Networks , 2001 .

[52]  Leandro Nunes de Castro,et al.  Recent Developments In Biologically Inspired Computing , 2004 .

[53]  Jerne Nk Towards a network theory of the immune system. , 1974 .

[54]  Jonathan Timmis,et al.  Assessing the performance of two immune inspired algorithms and a hybrid genetic algorithm for function optimisation , 2004, Proceedings of the 2004 Congress on Evolutionary Computation (IEEE Cat. No.04TH8753).

[55]  Peter J. Bentley,et al.  Immune Memory in the Dynamic Clonal Selection Algorithm , 2002 .

[56]  Teuvo Kohonen,et al.  Self-Organizing Maps , 2010 .

[57]  Stephanie Forrest,et al.  Principles of a computer immune system , 1998, NSPW '97.

[58]  Naruaki Toma,et al.  Immune algorithm with immune network and MHC for adaptive problem solving , 1999, IEEE SMC'99 Conference Proceedings. 1999 IEEE International Conference on Systems, Man, and Cybernetics (Cat. No.99CH37028).

[59]  Bruce C. Trapnell A Peer-to-Peer Blacklisting Strategy Inspired by Leukocyte-Endothelium Interaction , 2005, ICARIS.

[60]  F. Varela,et al.  Natural tolerance in a simple immune network. , 1995, Journal of theoretical biology.

[61]  Alan S. Perelson,et al.  Growth and Recruitment in the Immune Network , 1992 .

[62]  Ricardo Tanscheit,et al.  An Immune Fault Detection System for Analog Circuits with Automatic Detector Generation , 2006, 2006 IEEE International Conference on Evolutionary Computation.

[63]  Adnan Acan Clonal selection algorithm with operator multiplicity , 2004, Proceedings of the 2004 Congress on Evolutionary Computation (IEEE Cat. No.04TH8753).

[64]  Uwe Aickelin,et al.  A recommender system based on the immune network , 2002, Proceedings of the 2002 Congress on Evolutionary Computation. CEC'02 (Cat. No.02TH8600).

[65]  Derek J. Smith,et al.  Immunological Memory is Associative , 1998 .

[66]  Mark Burgess Evaluating cfengine’s immunity model of site maintenance , 2007 .

[67]  Gerry V. Dozier,et al.  Vulnerability Analysis of Immunity-Based Intrusion Detection Systems Using Evolutionary Hackers , 2004, GECCO.

[68]  F T Vertosick,et al.  Immune network theory: a role for parallel distributed processing? , 1989, Immunology.

[69]  Matthew M. Williamson,et al.  Implementing and Testing a Virus Throttle , 2003, USENIX Security Symposium.

[70]  Fabio A. González,et al.  A Randomized Real-Valued Negative Selection Algorithm , 2003, ICARIS.

[71]  Abder Koukam,et al.  A middleware for large scale networks inspired by the immune system , 2002, Proceedings 16th International Parallel and Distributed Processing Symposium.

[72]  Anna Maria Fanelli,et al.  An associative memory based on the immune networks , 1996, Proceedings of International Conference on Neural Networks (ICNN'96).

[73]  Hans-Paul Schwefel,et al.  Evolution strategies – A comprehensive introduction , 2002, Natural Computing.

[74]  Stephanie Forrest,et al.  A stochastic model of cytotoxic T cell responses. , 2004, Journal of theoretical biology.

[75]  Klaus Rajewsky,et al.  Intraclonal generation of antibody mutants in germinal centres , 1991, Nature.

[76]  Hajime Igarashi,et al.  An Immune-based Algorithm for Topology Optimization , 2006, 2006 IEEE International Conference on Evolutionary Computation.

[77]  D. Norman Learning and Memory , 1982 .

[78]  Pauline Hogeweg,et al.  Memory but no suppression in low-dimensional symmetric idiotypic networks , 1989, Bulletin of mathematical biology.

[79]  Norman Sartorius,et al.  Calgary, Alberta, Canada , 2005 .

[80]  P E Seiden,et al.  A computer model of cellular interactions in the immune system. , 1992, Immunology today.

[81]  Senhua Yu,et al.  MILA - Multilevel Immune Learning Algorithm , 2003, GECCO.

[82]  Jongsoo Lee,et al.  GA BASED SIMULATION OF IMMUNE NETWORKS APPLICATIONS IN STRUCTURAL OPTIMIZATION , 1997 .

[83]  Fumihito Arai,et al.  Control of the distributed autonomous robotic system based on the biologically inspired immunological architecture , 1997, Proceedings of International Conference on Robotics and Automation.

[84]  Jonathan Timmis,et al.  Immune and Evolutionary Approaches to Software Mutation Testing , 2007, ICARIS.

[85]  Yoshiteru Ishida,et al.  Immunity-Based Systems , 2004, Advanced Information Processing.

[86]  Ben Paechter,et al.  An Immune-Inspired Approach to Speckled Computing , 2007, ICARIS.

[87]  David J. C. Mackay,et al.  Introduction to Monte Carlo Methods , 1998, Learning in Graphical Models.

[88]  Z Dembic,et al.  Immune system protects integrity of tissues. , 2000, Molecular immunology.

[89]  Dietrich Stauffer,et al.  Systematics of the models of immune response and autoimmune disease , 1990 .

[90]  Hsiu-Sen Chiang,et al.  Internet security: malicious e-mails detection and protection , 2004, Ind. Manag. Data Syst..

[91]  Stephanie Forrest,et al.  An immunological model of distributed detection and its application to computer security , 1999 .

[92]  Andrew M. Tyrrell,et al.  Immunotronics: Hardware Fault Tolerance Inspired by the Immune System , 2000, ICES.

[93]  Rajeev Motwani,et al.  Randomized algorithms , 1996, CSUR.

[94]  H. von Boehmer,et al.  Self-nonself discrimination by T cells. , 1990, Science.

[95]  Krzysztof Ciesielski,et al.  An Immune Network for Contextual Text Data Clustering , 2006, ICARIS.

[96]  Vincenzo Cutello,et al.  Exploring the Capability of Immune Algorithms: A Characterization of Hypermutation Operators , 2004, ICARIS.

[97]  Slawomir T. Wierzchon,et al.  Discriminative power of the receptors activated by k-contiguous bits rule , 2000 .

[98]  Fabio A. González,et al.  TECNO-STREAMS: tracking evolving clusters in noisy data streams with a scalable immune system learning model , 2003, Third IEEE International Conference on Data Mining.

[99]  Makoto Tsukiyama,et al.  Immunity-Based Management System for a Semiconductor Production Line* , 1999 .

[100]  Leandro Nunes de Castro,et al.  The Clonal Selection Algorithm with Engineering Applications 1 , 2000 .

[101]  James C. Neidhoefer,et al.  Immunized adaptive critics , 1997, Proceedings of International Conference on Neural Networks (ICNN'97).

[102]  J. Hammersley,et al.  Monte Carlo Methods , 1966 .

[103]  Yoshiki Uchikawa,et al.  Evolutionary construction of an immune network-based behavior arbitration mechanism for autonomous mobile robots , 1998 .

[104]  Leandro Nunes de Castro Comparing Immue and Neural Networks , 2002, SBRN.

[105]  S. Kauffman,et al.  Adaptive Dynamic Networks as Models for the Immune System and Autocatalytic Sets , 1987, Annals of the New York Academy of Sciences.

[106]  Jonathan Timmis,et al.  A Fractal Immune Network , 2004, ICARIS.

[107]  Dipankar Dasgupta Immunity-Based Intrusion Detection System: A General Framework , 1999 .

[108]  Barak A. Pearlmutter,et al.  Detecting intrusions using system calls: alternative data models , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).

[109]  Franco Celada,et al.  Modeling immune cognition , 1998, SMC'98 Conference Proceedings. 1998 IEEE International Conference on Systems, Man, and Cybernetics (Cat. No.98CH36218).

[110]  D. Dasgupta,et al.  Immunity-based systems: a survey , 1997, 1997 IEEE International Conference on Systems, Man, and Cybernetics. Computational Cybernetics and Simulation.

[111]  Abder Koukam,et al.  Immune-based middleware for large scale network , 2002, 27th Annual IEEE Conference on Local Computer Networks, 2002. Proceedings. LCN 2002..

[112]  Paul Helman,et al.  An immunological approach to change detection: algorithms, analysis and implications , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.

[113]  David W. Corne,et al.  An Investigation of the Negative Selection Algorithm for Fault Detection in Refrigeration Systems , 2003, ICARIS.

[114]  Alex A. Freitas,et al.  An immunological algorithm for discovering small-disjunct rules in data mining , 2001 .

[115]  G. F. Burton,et al.  Follicular dendritic cells and presentation of antigen and costimulatory signals to B cells , 1997, Immunological reviews.

[116]  Walmir M. Caminhas,et al.  A Novel Immune Inspired Approach to Fault Detection , 2007, ICARIS.

[117]  Jonathan Timmis,et al.  A Markov Chain Model of the B-Cell Algorithm , 2005, ICARIS.

[118]  G. Hoffmann A theory of regulation and self‐nonself discrimination in an immune network , 1975, European journal of immunology.

[119]  Stephanie Forrest,et al.  Engineering an Immune System 1 , 2001 .

[120]  A S Perelson,et al.  Localized memories in idiotypic networks. , 1990, Journal of theoretical biology.

[121]  Stephanie Forrest,et al.  Intrusion Detection Using Sequences of System Calls , 1998, J. Comput. Secur..

[122]  Gianni Tedesco,et al.  Diophantine Benchmarks for the B-Cell Algorithm , 2006, ICARIS.

[123]  Debashish Chowdhury,et al.  Robustness of the network models of immune response , 1990 .

[124]  R. O. Canham,et al.  A MULTILAYERED IMMUNE SYSTEM FOR HARDWARE FAULT TOLERANCE WITHIN AN EMBRYONIC ARRAY , 2002 .

[125]  Alex A. Freitas,et al.  A Danger Theory Approach to Web Mining , 2003 .

[126]  Melvin Cohn,et al.  A Theory of Self-Nonself Discrimination , 1970, Science.

[127]  A S Perelson,et al.  A Cayley tree immune network model with antibody dynamics. , 1993, Bulletin of mathematical biology.

[128]  Ki-Won Yeom,et al.  Immune-inspired Algorithm for Anomaly Detection , 2007, Computational Intelligence in Information Assurance and Security.

[129]  John A. Stankovic,et al.  Distributed Processing , 1978, Computer.

[130]  I. Maclennan,et al.  Mechanism of antigen-driven selection in germinal centres , 1989, Nature.

[131]  Chen Ying,et al.  Design and Simulation of a Biological Immune Controller Based on Improved Varela Immune Network Model , 2005, ICARIS.

[132]  Dietrich Stauffer,et al.  Statistical physics of immune networks , 1992 .

[133]  F. Burnet A modification of jerne's theory of antibody production using the concept of clonal selection , 1976, CA: a cancer journal for clinicians.

[134]  Fernando José Von Zuben,et al.  Fault Detection Algorithm for Telephone Systems Based on the Danger Theory , 2005, ICARIS.

[135]  Stephanie Forrest,et al.  Generating biomorphs with an aesthetic immune system , 2002 .

[136]  Leandro Nunes de Castro,et al.  An Immunological Approach to Initialize Feedforward Neural Network Weights , 2001 .

[137]  Zhou Ji,et al.  Revisiting Negative Selection Algorithms , 2007, Evolutionary Computation.

[138]  K. Lafferty,et al.  A new analysis of allogeneic interactions. , 1975, The Australian journal of experimental biology and medical science.

[139]  Fernando José Von Zuben,et al.  Adaptive Radius Immune Algorithm for Data Clustering , 2005, ICARIS.

[140]  Stephanie Forrest,et al.  A sense of self for Unix processes , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.

[141]  Peter J. Bentley,et al.  An evaluation of negative selection in an artificial immune system for network intrusion detection , 2001 .

[142]  Hugues Bersini,et al.  Hints for Adaptive Problem Solving Gleaned from Immune Networks , 1990, PPSN.

[143]  Fabio A. González,et al.  Discriminating and visualizing anomalies using negative selection and self-organizing maps , 2005, GECCO '05.

[144]  Vincent Rodin,et al.  Simulation of thrombin generation during plasmatic coagulation and primary hemostasis , 2000, Smc 2000 conference proceedings. 2000 ieee international conference on systems, man and cybernetics. 'cybernetics evolving to systems, humans, organizations, and their complex interactions' (cat. no.0.

[145]  David H. Ackley,et al.  Building diverse computer systems , 1997, Proceedings. The Sixth Workshop on Hot Topics in Operating Systems (Cat. No.97TB100133).

[146]  V. Cutello,et al.  Lipschitzian Pattern Search and Immunological Algorithm with Quasi-Newton Method for the Protein Folding Problem: An Innovative Multistage Approach , 2005, WIRN/NAIS.

[147]  Rogério de Lemos,et al.  Immunising Automated Teller Machines , 2005, ICARIS.

[148]  H. Bersini,et al.  Frustrated chaos in biological networks. , 1997, Journal of theoretical biology.

[149]  Fernando José Von Zuben,et al.  Learning and optimization using the clonal selection principle , 2002, IEEE Trans. Evol. Comput..

[150]  Uwe Aickelin,et al.  Cooperative Automated Worm Response and Detection ImmuNe ALgorithm(CARDINAL) Inspired by T-Cell Immunity and Tolerance , 2005, ICARIS.

[151]  D. Wong,et al.  Negative Selection Algorithm for Aircraft Fault Detection , 2004, ICARIS.

[152]  J. Goodlad,et al.  Germinal centre cell kinetics , 1998, The Journal of pathology.

[153]  Carlos A. Coello Coello,et al.  Multiobjective Optimization Using Ideas from the Clonal Selection Principle , 2003, GECCO.

[154]  Claudia Eckert,et al.  An Investigation of R-Chunk Detector Generation on Higher Alphabets , 2004, GECCO.

[155]  Ray Paton Computing with biological metaphors , 1994 .

[156]  Alan S. Perelson,et al.  Genetic Algorithms and the Immune System , 1990, PPSN.

[157]  Dipankar Dasgupta,et al.  Immuno-inspired autonomic system for cyber defense , 2007, Inf. Secur. Tech. Rep..

[158]  Fabio A. González,et al.  Anomaly Detection Using Real-Valued Negative Selection , 2003, Genetic Programming and Evolvable Machines.

[159]  Angelo Baserga,et al.  Clonal Selection Theory , 1960 .

[160]  A. Perelson,et al.  Size and connectivity as emergent properties of a developing immune network. , 1991, Journal of theoretical biology.

[161]  Alan S. Perelson,et al.  Self-nonself discrimination in a computer , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.

[162]  Werner Dilger,et al.  Structural Properties of Shape-Spaces , 2006, ICARIS.

[163]  Yoshiteru Ishida,et al.  Active Diagnosis by Self-Organization: An Approach by The Immune Network Metaphor , 1997, IJCAI.

[164]  Licheng Jiao,et al.  Clonal operator and antibody clone algorithms , 2002, Proceedings. International Conference on Machine Learning and Cybernetics.

[165]  Stephanie Forrest,et al.  Computer immunology , 1997, CACM.

[166]  Simon M. Garrett Parameter-free, adaptive clonal selection , 2004, Proceedings of the 2004 Congress on Evolutionary Computation (IEEE Cat. No.04TH8753).

[167]  J. Doyne Farmer,et al.  A Rosetta stone for connectionism , 1990 .

[168]  A. Coutinho,et al.  Beyond Clonal Selection and Network , 1989, Immunological reviews.

[169]  Henry Y. K. Lau,et al.  An Immuno Robotic System for Humanitarian Search and Rescue (Application Stream) , 2007, ICARIS.

[170]  J J Hopfield,et al.  Neural networks and physical systems with emergent collective computational abilities. , 1982, Proceedings of the National Academy of Sciences of the United States of America.

[171]  Polly Matzinger,et al.  Friendly and dangerous signals: is the tissue in control? , 2007, Nature Immunology.

[172]  A. Perelson Immune Network Theory , 1989, Immunological reviews.

[173]  Hugues Bersini,et al.  Frustration induced chaos in a system of coupled ODE's , 1995 .