-
1
-
-
3543128182
-
Coverage and generalization in an artificial immune system
-
New York, 9-13 July Morgan Kaufmann Publishers
-
J. Balthrop, F. Esponda, S. Forrest, and M. Glickman. Coverage and generalization in an artificial immune system. In GECCO 2002: Proceedings of the Genetic and Evolutionary Computation Conference, pages 3-10, New York, 9-13 July 2002. Morgan Kaufmann Publishers.
-
(2002)
GECCO 2002: Proceedings of the Genetic and Evolutionary Computation Conference
, pp. 3-10
-
-
Balthrop, J.1
Esponda, F.2
Forrest, S.3
Glickman, M.4
-
3
-
-
1542487517
-
A parallel implementation of the artificial immune system to handle constraints in genetic algorithms: Preliminary results
-
Honolulu, Hawaii
-
C. A. C. Coello and N. C. Cortes. A parallel implementation of the artificial immune system to handle constraints in genetic algorithms: preliminary results. In Proceedings of the 2002 Congress on Evolutionary Computation CEC2002, pages 819-824, Honolulu, Hawaii, 2002.
-
(2002)
Proceedings of the 2002 Congress on Evolutionary Computation CEC2002
, pp. 819-824
-
-
Coello, C.A.C.1
Cortes, N.C.2
-
4
-
-
0036613083
-
An immunity-based technique to characterize intrusions in computer networks
-
June
-
D. Dagupta and F. González. An immunity-based technique to characterize intrusions in computer networks. IEEE Transactions on Evolutionary Computation, 6(3):281-291, June 2002.
-
(2002)
IEEE Transactions on Evolutionary Computation
, vol.6
, Issue.3
, pp. 281-291
-
-
Dagupta, D.1
González, F.2
-
5
-
-
0002511642
-
An overview of artificial immune systems and their applications
-
D. Dasgupta, editor, Springer-Verlag, Inc.
-
D. Dasgupta. An overview of artificial immune systems and their applications. In D. Dasgupta, editor, Artificial immune systems and their applications, pages pp 3-23. Springer-Verlag, Inc., 1999.
-
(1999)
Artificial Immune Systems and Their Applications
, pp. 3-23
-
-
Dasgupta, D.1
-
10
-
-
0029718285
-
An immunological approach to change detection: Algorithms, analysis and implications
-
Oakland, CA
-
P. D'haeseleer, S. Forrest, and P. Helman. An immunological approach to change detection: algorithms, analysis and implications. In Proceedings of the 1996 IEEE Symposium on Computer Security and Privacy, pages 110-119, Oakland, CA, 1996.
-
(1996)
Proceedings of the 1996 IEEE Symposium on Computer Security and Privacy
, pp. 110-119
-
-
D'Haeseleer, P.1
Forrest, S.2
Helman, P.3
-
11
-
-
46149127936
-
The immune system, adaptation, and machine learning
-
J. D. Farmer, N. H. Packard, and A. S. Perelson. The immune system, adaptation, and machine learning. Physica D, 22:187-204, 1986.
-
(1986)
Physica D
, vol.22
, pp. 187-204
-
-
Farmer, J.D.1
Packard, N.H.2
Perelson, A.S.3
-
12
-
-
0027961889
-
Self-nonself discrimination in a computer
-
S. Forrest, A. Perelson, L. Allen, and R. Cherukuri. Self-nonself discrimination in a computer. In Proc. IEEE Symp. on Research in Security and Privacy, pages 202-212, 1994.
-
(1994)
Proc. IEEE Symp. on Research in Security and Privacy
, pp. 202-212
-
-
Forrest, S.1
Perelson, A.2
Allen, L.3
Cherukuri, R.4
-
14
-
-
84901440662
-
Combining negative selection and classification techniques for anomaly detection
-
Honolulu, HI, May IEEE
-
F. González, D. Dasgupta, and R. Kozma. Combining negative selection and classification techniques for anomaly detection. In Proceedings of the 2002 Congress on Evolutionary Computation CEC2002, pages 705-710, Honolulu, HI, May 2002. IEEE.
-
(2002)
Proceedings of the 2002 Congress on Evolutionary Computation CEC2002
, pp. 705-710
-
-
González, F.1
Dasgupta, D.2
Kozma, R.3
-
15
-
-
0036613003
-
An Artificial Immune System Architecture for Computer Security Applications
-
June
-
P. Harmer, G. Williams, P.D.and Gnusch, and G. Lamont. An Artificial Immune System Architecture for Computer Security Applications. IEEE Transactions on Evolutionary Computation, 6(3):252-280, June 2002.
-
(2002)
IEEE Transactions on Evolutionary Computation
, vol.6
, Issue.3
, pp. 252-280
-
-
Harmer, P.1
Williams, G.2
Gnusch, P.D.3
Lamont, G.4
-
16
-
-
0034546374
-
Architecture for an artificial immune system
-
S. Hofmeyr and S. Forrest. Architecture for an artificial immune system. Evolutionary Computation, 8(4):443-473, 2000.
-
(2000)
Evolutionary Computation
, vol.8
, Issue.4
, pp. 443-473
-
-
Hofmeyr, S.1
Forrest, S.2
-
18
-
-
0003707420
-
-
MIT Press, Cambridge
-
J. H. Holland, K. J. Holyoak, R. E. Nisbett, and P. R. Thagard. Induction: Processes of Inference, Learning, and Discovery. MIT Press, Cambridge, 1986.
-
(1986)
Induction: Processes of Inference, Learning, and Discovery
-
-
Holland, J.H.1
Holyoak, K.J.2
Nisbett, R.E.3
Thagard, P.R.4
-
19
-
-
0015956495
-
Towards a network theory of the immune system
-
N. K. Jerne. Towards a network theory of the immune system. Ann. Immunol. (Inst. Pasteur), 125C:373-389, 1974.
-
(1974)
Ann. Immunol. (Inst. Pasteur)
, vol.125 C
, pp. 373-389
-
-
Jerne, N.K.1
-
20
-
-
0038458266
-
An evaluation of negative selection in an artificial immune system for network intrusion detection
-
San Francisco, California, USA, Morgan Kaufmann
-
J. Kim and P. Bentley. An evaluation of negative selection in an artificial immune system for network intrusion detection. In GECCO 2001: Proceedings of the Genetic and Evolutionary Computation Conference, pages 1330-1337, San Francisco, California, USA, 2001. Morgan Kaufmann.
-
(2001)
GECCO 2001: Proceedings of the Genetic and Evolutionary Computation Conference
, pp. 1330-1337
-
-
Kim, J.1
Bentley, P.2
-
22
-
-
3142744412
-
A resource limited artificial immune system for data analysis
-
Cambridge, UK
-
J. Timmis and M. J. Neal. A resource limited artificial immune system for data analysis. In Research and development in intelligent systems XVII, proceedings of ES2000, pages 19-32, Cambridge, UK, 2000.
-
(2000)
Research and Development in Intelligent Systems XVII, Proceedings of ES2000
, pp. 19-32
-
-
Timmis, J.1
Neal, M.J.2
-
23
-
-
84947551624
-
CDIS: Towards a computer immune system for detecting network intrusions
-
P. D. Williams, K. P. Anchor, J. L. Bebo, G. H. Gunsch, and G. D. Lamont. CDIS: Towards a computer immune system for detecting network intrusions. Lecture Notes in Computer Science, 2212:117-133, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2212
, pp. 117-133
-
-
Williams, P.D.1
Anchor, K.P.2
Bebo, J.L.3
Gunsch, G.H.4
Lamont, G.D.5
|