Temporal anomaly detection: an artificial immune approach based on T cell activation, clonal size regulation and homeostasis.
暂无分享,去创建一个
[1] Z. Grossman,et al. Adaptive cellular interactions in the immune system: the tunable activation threshold and the significance of subthreshold responses. , 1992, Proceedings of the National Academy of Sciences of the United States of America.
[2] Z. Grossman,et al. Tuning of activation thresholds explains flexibility in the selection and development of T cells in the thymus. , 1996, Proceedings of the National Academy of Sciences of the United States of America.
[3] Stephanie Forrest,et al. Immunity by design: an artificial immune system , 1999 .
[4] R. Vance,et al. Cutting Edge Commentary: A Copernican Revolution? Doubts About the Danger Theory1 , 2000, The Journal of Immunology.
[5] Peter J. Bentley,et al. An evaluation of negative selection in an artificial immune system for network intrusion detection , 2001 .
[6] Jonathan Timmis,et al. Artificial Immune Systems: A New Computational Intelligence Approach , 2003 .
[7] P. Matzinger. The Danger Model: A Renewed Sense of Self , 2002, Science.
[8] Jonathan Timmis,et al. Artificial immune systems as a novel soft computing paradigm , 2003, Soft Comput..
[9] A. Tbakhi. Color Atlas of Immunology , 2004, Annals of Saudi Medicine.
[10] David A Rand,et al. Dynamics of T cell activation threshold tuning. , 2004, Journal of theoretical biology.
[11] Claudia Eckert,et al. On the appropriateness of negative selection defined over Hamming shape-space as a network intrusion detection system , 2005, 2005 IEEE Congress on Evolutionary Computation.
[12] Dejan Milutinovic,et al. Immunological self-tolerance: lessons from mathematical modeling , 2005 .
[13] Julie Greensmith,et al. Immune system approaches to intrusion detection – a review , 2004, Natural Computing.
[14] D. Dasgupta,et al. Advances in artificial immune systems , 2006, IEEE Computational Intelligence Magazine.
[15] João Pedro Pedroso,et al. Simple Metaheuristics Using the Simplex Algorithm for Non-linear Programming , 2007, SLS.
[16] Manuel Eduardo Correia,et al. TAT-NIDS: An Immune-Based Anomaly Detection Architecture for Network Intrusion Detection , 2008, IWPACBB.
[17] Uwe Aickelin,et al. The Danger Theory and Its Application to Artificial Immune Systems , 2008, ArXiv.
[18] Manuel Eduardo Correia,et al. Towards an Immune-inspired Temporal Anomaly Detection Algorithm based on Tunable Activation Thresholds , 2009, BIOSIGNALS.
[19] Manuel Eduardo Correia,et al. An Artificial Immune System for Temporal Anomaly Detection Using Cell Activation Thresholds and Clonal Size Regulation with Homeostasis , 2009, 2009 International Joint Conference on Bioinformatics, Systems Biology and Intelligent Computing.