Survey of DCA for Abnormal Detection
暂无分享,去创建一个
[1] Julie Greensmith,et al. DCA for bot detection , 2008, 2008 IEEE Congress on Evolutionary Computation (IEEE World Congress on Computational Intelligence).
[2] Henry Y. K. Lau,et al. A Cooperative Multi-objective Optimization Framework based on Dendritic Cells Migration Dynamics , 2012, SGAI Conf..
[3] Julie Greensmith,et al. The dendritic cell algorithm , 2007 .
[4] Julie Greensmith,et al. The Application of a Dendritic Cell Algorithm to a Robotic Classifier , 2007, ICARIS.
[5] Ki-Won Yeom,et al. Immune-inspired Algorithm for Anomaly Detection , 2007, Computational Intelligence in Information Assurance and Security.
[6] Peter J. Bentley,et al. Danger Is Ubiquitous: Detecting Malicious Activities in Sensor Networks Using the Dendritic Cell Algorithm , 2006, ICARIS.
[7] Zied Elouedi,et al. RC-DCA: A New Feature Selection and Signal Categorization Technique for the Dendritic Cell Algorithm Based on Rough Set Theory , 2012, ICARIS.
[8] Alan S. Perelson,et al. Self-nonself discrimination in a computer , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.
[9] Chris J. Musselle. Insights into the Antigen Sampling Component of the Dendritic Cell Algorithm , 2010, ICARIS.
[10] Iain Bate,et al. Improving the reliability of real-time embedded systems using innate immune techniques , 2008, Evol. Intell..
[11] Graham Kendall,et al. Geometrical insights into the dendritic cell algorithm , 2009, GECCO '09.
[12] Julie Greensmith,et al. Further Exploration of the Dendritic Cell Algorithm: Antigen Multiplier and Time Windows , 2008, ICARIS.
[13] Graham Kendall,et al. Frequency analysis for dendritic cell population tuning , 2008, Evol. Intell..
[14] Gerold Schuler,et al. Immature, semi-mature and fully mature dendritic cells: which signals induce tolerance or immunity? , 2002, Trends in immunology.
[15] Iain Bate,et al. Applying artificial immune systems to real-time embedded systems , 2007, 2007 IEEE Congress on Evolutionary Computation.
[16] Julie Greensmith,et al. Articulation and Clarification of the Dendritic Cell Algorithm , 2006, ICARIS.
[17] Julie Greensmith,et al. The Deterministic Dendritic Cell Algorithm , 2008, ICARIS.
[18] Song Yuan,et al. A Dendritic Cell Algorithm for real-time anomaly detection , 2012, 2012 IEEE International Conference on Computer Science and Automation Engineering (CSAE).
[19] Guilherme Costa Silva,et al. A Transitional View of Immune Inspired Techniques for Anomaly Detection , 2012, IDEAL.
[20] Peng Li,et al. Research on Network Malicious Code Dendritic Cell Immune Algorithm Based on Fuzzy Weighted Support Vector Machine , 2012, CWSN.
[21] Chen Xu,et al. Distributed Firewall with Intrusion Detection System , 2012, J. Comput..
[22] Uwe Aickelin,et al. Danger Theory: The Link between AIS and IDS? , 2003, ICARIS.
[23] Vivek Kumar,et al. Artificial Immune System: A potential tool to handle bioinformatics issues , 2012 .
[24] Julie Greensmith,et al. Dendritic cells for SYN scan detection , 2007, GECCO '07.
[25] Zied Elouedi,et al. FDCM: A Fuzzy Dendritic Cell Method , 2010, ICARIS.
[26] Feng Gu,et al. Theoretical and empirical extensions of the dendritic cell algorithm , 2011 .
[27] Julie Greensmith,et al. Dendritic Cells for Real-Time Anomaly Detection , 2010, ArXiv.
[28] Julie Greensmith,et al. Integrating real-time analysis with the dendritic cell algorithm through segmentation , 2009, GECCO.
[29] Julie Greensmith,et al. Performance Evaluation of DCA and SRC on a Single Bot Detection , 2009, ArXiv.
[30] Leandro Nunes de Castro,et al. The Clonal Selection Algorithm with Engineering Applications 1 , 2000 .
[31] P. Matzinger. Tolerance, danger, and the extended family. , 1994, Annual review of immunology.
[32] Jonathan Timmis,et al. A modified Dendritic Cell Algorithm for on-line error detection in robotic systems , 2009, 2009 IEEE Congress on Evolutionary Computation.
[33] Julie Greensmith,et al. PCA 4 DCA: The Application Of Principal Component Analysis To The Dendritic Cell Algorithm , 2010, ArXiv.
[34] Julie Greensmith,et al. Exploration of the Dendritic Cell Algorithm Using the Duration Calculus , 2009, ICARIS.
[35] Fernando José Von Zuben,et al. An Evolutionary Immune Network for Data Clustering , 2000, SBRN.
[36] Peter J. Bentley,et al. Detecting interest cache poisoning in sensor networks using an artificial immune algorithm , 2010, Applied Intelligence.
[37] Huan Yang,et al. Introducing Adjuvants to Dendritic Cell Algorithm for Stealthy Malware Detection , 2012, 2012 Fifth International Symposium on Computational Intelligence and Design.
[38] Ying Wang,et al. Research on Intrusion Detection Model of Heterogeneous Attributes Clustering , 2012, J. Softw..
[39] Julie Greensmith,et al. The DCA: SOMe comparison , 2008, Evol. Intell..
[40] Yiwen Liang,et al. Dendritic cell algorithm for web server aging detection , 2012 .
[41] Tang Chao-jing. Integrated artificial immune system for intrusion detection , 2012 .
[42] Uwe Aickelin,et al. Cooperative Automated Worm Response and Detection ImmuNe ALgorithm(CARDINAL) Inspired by T-Cell Immunity and Tolerance , 2005, ICARIS.
[43] Anurag Jain,et al. IMPROVING DENDRITIC CELL ALGORITHM BY DEMPSTER BELIEF THEORY , 2012 .
[44] Julie Greensmith,et al. Theoretical Formulation and Analysis of the Deterministic Dendritic Cell Algorithm , 2013, Biosyst..
[45] L. Souici-Meslati,et al. Artificial Immune System for Intrusion Detection , 2012 .
[46] Chris J. Musselle. Rethinking Concepts of the Dendritic Cell Algorithm for Multiple Data Stream Analysis , 2012, ICARIS.