Positive and negative selection in a multilayer artificial immune system
暂无分享,去创建一个
[1] Stephanie Forrest,et al. Architecture for an Artificial Immune System , 2000, Evolutionary Computation.
[2] Uwe Aickelin,et al. Danger Theory: The Link between AIS and IDS? , 2003, ICARIS.
[3] Alan S. Perelson,et al. Self-nonself discrimination in a computer , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.
[4] Kristopher Kendall,et al. A Database of Computer Attacks for the Evaluation of Intrusion Detection Systems , 1999 .
[5] Uwe Aickelin,et al. The Danger Theory and Its Application to Artificial Immune Systems , 2008, ArXiv.
[6] Jeffrey O. Kephart,et al. A biologically inspired immune system for computers , 1994 .
[7] Stephanie Forrest,et al. Immunity by design: an artificial immune system , 1999 .
[8] J. Playfair. Infection and Immunity , 1995 .
[9] Melvin Cohn,et al. An alternative to current thinking about positive selection, negative selection and activation of T cells , 2004, Immunology.
[10] Stephanie Forrest,et al. Infect Recognize Destroy , 1996 .
[11] M. Cohn. Tritope model of restrictive recognition by the TCR. , 2003, Trends in immunology.
[12] P. Matzinger. Tolerance, danger, and the extended family. , 1994, Annual review of immunology.
[13] Richard E. Overill,et al. Design of an artificial immune system as a novel anomaly detector for combating financial fraud in the retail sector , 2003, The 2003 Congress on Evolutionary Computation, 2003. CEC '03..
[14] L. Sompayrac,et al. How the immune system works , 1999 .
[15] Jonathan Timmis,et al. Artificial immune systems - a new computational intelligence paradigm , 2002 .
[16] Zhou Ji,et al. Artificial immune system (AIS) research in the last five years , 2003, The 2003 Congress on Evolutionary Computation, 2003. CEC '03..
[17] C. Janeway. Immunobiology: The Immune System in Health and Disease , 1996 .
[18] Peter J. Bentley,et al. Negative selection and niching by an artificial immune system for network intrusion detection , 1999 .
[19] Senhua Yu,et al. MILA - Multilevel Immune Learning Algorithm , 2003, GECCO.
[20] P. Matzinger. The Danger Model: A Renewed Sense of Self , 2002, Science.
[21] Kevin P. Anchor,et al. CDIS: Towards a Computer Immune System for Detecting Network Intrusions , 2001, Recent Advances in Intrusion Detection.
[22] Stephanie Forrest,et al. Principles of a computer immune system , 1998, NSPW '97.
[23] P. Helman,et al. A formal framework for positive and negative detection schemes , 2004, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).
[24] Stephanie Forrest,et al. Automated response using system-call delays , 2000 .