-
1
-
-
0031852781
-
Territory size and shape in fire ants: A model based on neighborhood interactions
-
June
-
E. S. Adams. Territory size and shape in fire ants: a model based on neighborhood interactions. Ecology, 79(4):1125-1134, June 1998.
-
(1998)
Ecology
, vol.79
, Issue.4
, pp. 1125-1134
-
-
Adams, E.S.1
-
2
-
-
34548835213
-
-
S. Balachandran, D. Dasgupta, F. Nino, and D. Garrett. A general framework for evolving multi-shaped detectors in negative selection. In IEEE Symposium Series on Computational Intelligence, Honolulu, Hawaii, April 2007.
-
S. Balachandran, D. Dasgupta, F. Nino, and D. Garrett. A general framework for evolving multi-shaped detectors in negative selection. In IEEE Symposium Series on Computational Intelligence, Honolulu, Hawaii, April 2007.
-
-
-
-
3
-
-
0008444547
-
Polar IFS + parisian genetic programming = effcient IFS inverse problem solving
-
P. Collet, E. Lutton, and F. Raynal. Polar IFS + parisian genetic programming = effcient IFS inverse problem solving. Genetic Programming and Evolvable Machines, 1:339-361, 2000.
-
(2000)
Genetic Programming and Evolvable Machines
, vol.1
, pp. 339-361
-
-
Collet, P.1
Lutton, E.2
Raynal, F.3
-
4
-
-
0036613083
-
An immunity-based technique to characterize intrusions in computer networks
-
June
-
D. Dasgupta and F. Gonzalez, An immunity-based technique to characterize intrusions in computer networks. IEEE Transactions on Evolutionary Computation, 6(3):281-291, June 2002.
-
(2002)
IEEE Transactions on Evolutionary Computation
, vol.6
, Issue.3
, pp. 281-291
-
-
Dasgupta, D.1
Gonzalez, F.2
-
5
-
-
24644518623
-
Automated photogrammetric network design using the parisian approach
-
Springer Berlin, Heidelberg
-
E. Dunn, G. Olague, and E. Lutton. Automated photogrammetric network design using the parisian approach. In Applications on Evolutionary Computing, pages 356-365. Springer Berlin / Heidelberg, 2005.
-
(2005)
Applications on Evolutionary Computing
, pp. 356-365
-
-
Dunn, E.1
Olague, G.2
Lutton, E.3
-
6
-
-
0001351468
-
Using genetic algorithms to explore pattern recognition in the immune system
-
S. Forrest, B. Javornik, R. E. Smith, and A. S. Perelson. Using genetic algorithms to explore pattern recognition in the immune system. Evolutionary Computation, 1(3):191-211, 1993.
-
(1993)
Evolutionary Computation
, vol.1
, Issue.3
, pp. 191-211
-
-
Forrest, S.1
Javornik, B.2
Smith, R.E.3
Perelson, A.S.4
-
7
-
-
0027961889
-
Self-nonself discrimination in a computer
-
S. Forrest, A. Perelson, L. Allen, and R. Cherukuri. Self-nonself discrimination in a computer. In Proceedings of the 1994 IEEE Symposium on Research in Security and Privacy, pages 202-212, 1994.
-
(1994)
Proceedings of the 1994 IEEE Symposium on Research in Security and Privacy
, pp. 202-212
-
-
Forrest, S.1
Perelson, A.2
Allen, L.3
Cherukuri, R.4
-
8
-
-
35248820180
-
The effect of binary matching rules in negative selection
-
Chicago, IL, US, 12-16 July
-
F. Gonzalez, D. Dasgupta, and J. Gomez. The effect of binary matching rules in negative selection. In Genetic and Evolutionary Computation Conference (GECCO '03), pages 195-206, Chicago, IL., US, 12-16 July 2003.
-
(2003)
Genetic and Evolutionary Computation Conference (GECCO '03)
, pp. 195-206
-
-
Gonzalez, F.1
Dasgupta, D.2
Gomez, J.3
-
9
-
-
84901643828
-
An evolutionary approach to generate fuzzy anomaly signatures
-
West point, NY
-
F. Gonzalez, J. Gomez, M. Kaniganti, and D. Dasgupta. An evolutionary approach to generate fuzzy anomaly signatures. In Proceedings of the Fourth Annual IEEE Information Assurance Workshop, pages 251-259, West point, NY, 2003.
-
(2003)
Proceedings of the Fourth Annual IEEE Information Assurance Workshop
, pp. 251-259
-
-
Gonzalez, F.1
Gomez, J.2
Kaniganti, M.3
Dasgupta, D.4
-
15
-
-
0012330853
-
Negative selection and niching by an artificial immune system for network intrusion detection
-
Orlando, Florida, 13-17 July
-
J. Kim and P. Bentley. Negative selection and niching by an artificial immune system for network intrusion detection, In Genetic and Evolutionary Computation Conference (GECCO '99), pages 149-158, Orlando, Florida, 13-17 July 1999.
-
(1999)
Genetic and Evolutionary Computation Conference (GECCO '99)
, pp. 149-158
-
-
Kim, J.1
Bentley, P.2
-
18
-
-
33750257602
-
Immune anomaly detection enhanced with evolutionary paradigms
-
Seattle, WA, US, 8-12 July
-
M. Ostaszewski, F. Seredynski, and P. Bouvry. Immune anomaly detection enhanced with evolutionary paradigms. In Genetic And Evolutionary Computation Conference (GECCO '06), pages 119 - 126, Seattle, WA., US, 8-12 July 2006.
-
(2006)
Genetic And Evolutionary Computation Conference (GECCO '06)
, pp. 119-126
-
-
Ostaszewski, M.1
Seredynski, F.2
Bouvry, P.3
-
20
-
-
57349098031
-
Evolving discrete-valued anomaly detectors for a network intrusion detection system using negative selection
-
S. T. Powers and J. He. Evolving discrete-valued anomaly detectors for a network intrusion detection system using negative selection. In The 6th Annual Workshop on Computational Intelligence (UKCI '06), pages 41-48, 2006.
-
(2006)
The 6th Annual Workshop on Computational Intelligence (UKCI '06)
, pp. 41-48
-
-
Powers, S.T.1
He, J.2
-
21
-
-
32444442909
-
An evolutionary algorithm to generate hyper-ellipsoid detectors for negative selection
-
Washington DC, USA
-
J. M. Shapiro, G. B. Lamont, and G. L. Peterson. An evolutionary algorithm to generate hyper-ellipsoid detectors for negative selection. In Genetic and evolutionary computation Conference (GECCO '03), pages 337-344, Washington DC, USA, 2005.
-
(2005)
Genetic and evolutionary computation Conference (GECCO '03)
, pp. 337-344
-
-
Shapiro, J.M.1
Lamont, G.B.2
Peterson, G.L.3
-
22
-
-
57349183371
-
Theft, fraud cost retailers $8 million a day
-
March 2, Newspaper
-
M. Toneguzzi. Theft, fraud cost retailers $8 million a day. Ottawa Citizen, March 2 2007, Newspaper.
-
(2007)
Ottawa Citizen
-
-
Toneguzzi, M.1
|