-
2
-
-
21244465997
-
How do we evaluate artificial immune systems?
-
Garrett, S.M.: How do we evaluate artificial immune systems? Evolutionary Computation 13(2), 145-178 (2005)
-
(2005)
Evolutionary Computation
, vol.13
, Issue.2
, pp. 145-178
-
-
Garrett, S.M.1
-
3
-
-
33751017631
-
-
Aickelin, U., Greensmith, T., Twycross, J.: Immune System Approaches to Intrusion Detection - A Review. In: Nicosia, G., Cutello, V., Bentley, P.J., Timmis, J. (eds.) ICARIS 2004. LNCS, 3239, pp. 316-329. Springer, Heidelberg (2004)
-
Aickelin, U., Greensmith, T., Twycross, J.: Immune System Approaches to Intrusion Detection - A Review. In: Nicosia, G., Cutello, V., Bentley, P.J., Timmis, J. (eds.) ICARIS 2004. LNCS, vol. 3239, pp. 316-329. Springer, Heidelberg (2004)
-
-
-
-
5
-
-
0037066427
-
The danger model: A renewed sense of self
-
Matzinger, P.: The danger model: a renewed sense of self. Science 296(5566), 301-305 (2002)
-
(2002)
Science
, vol.296
, Issue.5566
, pp. 301-305
-
-
Matzinger, P.1
-
6
-
-
0024955886
-
Approaching the asymptote? Evolution and revolution in immunology
-
Janeway Jr., C.A.: Approaching the asymptote? Evolution and revolution in immunology. In: Cold Spring Harbor Symp. Quant. Biol., vol. 54, pp. 1-13 (1989)
-
(1989)
Cold Spring Harbor Symp. Quant. Biol
, vol.54
, pp. 1-13
-
-
Janeway Jr., C.A.1
-
7
-
-
0026791975
-
The immune system evolved to discriminate infectious nonself from noninfectious self
-
Janeway Jr.. C.A.: The immune system evolved to discriminate infectious nonself from noninfectious self. Immunol. Today 13(1), 11-16 (1992)
-
(1992)
Immunol. Today
, vol.13
, Issue.1
, pp. 11-16
-
-
Janeway Jr., C.A.1
-
8
-
-
0037066502
-
Decoding the patterns of self and nonself by the innate immune system
-
Medzhitov, R., Janeway Jr., C.A.: Decoding the patterns of self and nonself by the innate immune system. Science 296(5566), 298-300 (2001)
-
(2001)
Science
, vol.296
, Issue.5566
, pp. 298-300
-
-
Medzhitov, R.1
Janeway Jr., C.A.2
-
10
-
-
34248380806
-
-
Yeom, K.W.: Immune-inspired Algorithm for Anomaly Detection. In: Computational Intelligence in Information Assurance and Security. Studies in Computational Intelligence, 57, pp. 129-154. Springer, Heidelberg (2007)
-
Yeom, K.W.: Immune-inspired Algorithm for Anomaly Detection. In: Computational Intelligence in Information Assurance and Security. Studies in Computational Intelligence, vol. 57, pp. 129-154. Springer, Heidelberg (2007)
-
-
-
-
11
-
-
0025309468
-
Recognizing self from nonself
-
Koshland Jr., D.E.: Recognizing self from nonself. Science 248(4961), 1273 (1990)
-
(1990)
Science
, vol.248
, Issue.4961
, pp. 1273
-
-
Koshland Jr., D.E.1
-
13
-
-
33745892717
-
-
Dasgupta, D., Yu, S., Majumdar, N.S.: MILA - multilevel immune learning algorithm. In: Cantu-Paz, E., Foster, I.A., Deb, K., Davis, L., Roy, R., O'Reilly, U.-M., Beyer, H.-C. Kendall, C. Wilson, S.W., Harman, M., Wegener, J., Dasgupta, D., Potter, M.A., Schultz, A., Dowsland, K.A., Tonoska, N., Miller, J., Standish, R.K. (eds.) GECCO 2003. LNCS. 2723, pp. 183-194. Springer, Heidelberg (2003)
-
Dasgupta, D., Yu, S., Majumdar, N.S.: MILA - multilevel immune learning algorithm. In: Cantu-Paz, E., Foster, I.A., Deb, K., Davis, L., Roy, R., O'Reilly, U.-M., Beyer, H.-C. Kendall, C. Wilson, S.W., Harman, M., Wegener, J., Dasgupta, D., Potter, M.A., Schultz, A., Dowsland, K.A., Tonoska, N., Miller, J., Standish, R.K. (eds.) GECCO 2003. LNCS. vol. 2723, pp. 183-194. Springer, Heidelberg (2003)
-
-
-
-
14
-
-
70349514081
-
-
Iris Data Set, http://archive.ics.uci.edu/ml/datasets/Iris
-
Iris Data Set
-
-
-
15
-
-
26944471838
-
Real-Valued Negative Selection Algorithm with Variable-Sized Detectors
-
Deb, K, et al, eds, GECCO 2004, Springer, Heidelberg
-
Ji, Z., Dasgupta, D.: Real-Valued Negative Selection Algorithm with Variable-Sized Detectors. In: Deb, K., et al. (eds.) GECCO 2004. LNCS, vol. 3102, pp. 287-298. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3102
, pp. 287-298
-
-
Ji, Z.1
Dasgupta, D.2
|