-
1
-
-
1442290852
-
Negative selection: How to generate detectors
-
J. Timmis and P. J. Bentley, editors, University of Kent at Canterbury, September. University of Kent at Canterbury Printing Unit
-
M. Ayara, J. Timmis, R. de Lemos, L. de Castro, and R. Duncan. Negative selection: How to generate detectors. In J. Timmis and P. J. Bentley, editors, Proceedings of the 1st International Conference on Artificial Immune Systems (ICARIS), volume 1 of 89-98, University of Kent at Canterbury, September 2002. University of Kent at Canterbury Printing Unit.
-
(2002)
Proceedings of the 1st International Conference on Artificial Immune Systems (ICARIS)
, vol.1
, Issue.89-98
-
-
Ayara, M.1
Timmis, J.2
De Lemos, R.3
De Castro, L.4
Duncan, R.5
-
3
-
-
0036613083
-
An immunity-based technique to characterize intrusion in computer networks
-
June
-
D. Dasgupta and F. Gonzalez. An immunity-based technique to characterize intrusion in computer networks. IEEE Transactions on Evolutionary Computation, 6(3):1081-1088, June 2002.
-
(2002)
IEEE Transactions on Evolutionary Computation
, vol.6
, Issue.3
, pp. 1081-1088
-
-
Dasgupta, D.1
Gonzalez, F.2
-
5
-
-
0029718285
-
An immunological approach to change detection: Algorithms, analysis, and implications
-
P. D'haeseleer, S. Forrest, and P. Helman. An immunological approach to change detection: Algorithms, analysis, and implications. In Proceedings of the 1996 IEEE Symposium on Computer Security and Privacy, 1996.
-
(1996)
Proceedings of the 1996 IEEE Symposium on Computer Security and Privacy
-
-
D'Haeseleer, P.1
Forrest, S.2
Helman, P.3
-
6
-
-
35048852145
-
Online negative databases
-
G. N. et al, editor, September
-
F. Esponda, E. S. Ackley, S. Forrest, and P. Helman. Online negative databases. In G. N. et al, editor, Proceedings of Third International Conference on Artificial Immune Systems (ICARIS 2004), Pages 175-188, September 2004.
-
(2004)
Proceedings of Third International Conference on Artificial Immune Systems (ICARIS 2004)
, pp. 175-188
-
-
Esponda, F.1
Ackley, E.S.2
Forrest, S.3
Helman, P.4
-
8
-
-
0027961889
-
Self-nonself discrimination in a computer
-
Los Alamitos, CA. IEEE Computer Society Press
-
S. Forrest, A. Perelson, L. Allen, R., and Cherukuri. Self-nonself discrimination in a computer. In Proceedings of the 1994 IEEE Symposium on Research in Security and Privacy, Los Alamitos, CA, 1994. IEEE Computer Society Press.
-
(1994)
Proceedings of the 1994 IEEE Symposium on Research in Security and Privacy
-
-
Forrest, S.1
Perelson, A.2
Allen, L.3
Cherukuri, R.4
-
10
-
-
32444432413
-
A survey of artificial immune system: Are they useful?
-
in press
-
S. M. Garret. A survey of artificial immune system: Are they useful? Evolutionary Computation, in press, 2004.
-
(2004)
Evolutionary Computation
-
-
Garret, S.M.1
-
12
-
-
85157994034
-
Probably approximately correct learning
-
citeseer.ist.psu.edu/haussler90probably.html
-
D. Haussler. Probably approximately correct learning. In National Conference on Artificial Intelligence, pages 1101-1108, citeseer.ist.psu.edu/haussler90probably.html, 1990.
-
(1990)
National Conference on Artificial Intelligence
, pp. 1101-1108
-
-
Haussler, D.1
-
15
-
-
32444432299
-
Influence of training data's interpretation strategy on real-valued negative selection algorithm
-
The University of Memphis, June
-
Z. Ji. Influence of training data's interpretation strategy on real-valued negative selection algorithm. Technical report, The University of Memphis, June, 2004.
-
(2004)
Technical Report
-
-
Ji, Z.1
-
16
-
-
26944471838
-
Real-valued negative selection algorithm with variable-sized detectors
-
Z. Ji and D. Dasgupta. Real-valued negative selection algorithm with variable-sized detectors. In LNCS 3102, Proceedings of GECCO, pages 287-298, 2004.
-
(2004)
LNCS 3102, Proceedings of GECCO
, pp. 287-298
-
-
Ji, Z.1
Dasgupta, D.2
-
17
-
-
0742300833
-
Discriminative power of the receptors activated by k-contiguous bits rule
-
S. Wierzchon. Discriminative power of the receptors activated by k-contiguous bits rule. Journal of Computer Science and Technology, 1(3):1-13, 2000.
-
(2000)
Journal of Computer Science and Technology
, vol.1
, Issue.3
, pp. 1-13
-
-
Wierzchon, S.1
|