메뉴 건너뛰기




Volumn 8, Issue 3, 2009, Pages 613-641

Foundations of r-contiguous matching in negative selection for anomaly detection

Author keywords

Anomaly detection; Artificial immune systems; k CNF satisfiability; Negative selection

Indexed keywords

ANTIBODY; ANTIGEN;

EID: 70349143226     PISSN: 15677818     EISSN: None     Source Type: Journal    
DOI: 10.1007/s11047-008-9097-5     Document Type: Conference Paper
Times cited : (10)

References (42)
  • 1
    • 20544464593 scopus 로고    scopus 로고
    • Rigorous location of phase transitions in hard optimization problems
    • Achlioptas D, Naor A, Peres Y (2005) Rigorous location of phase transitions in hard optimization problems. Nature 435:759-764
    • (2005) Nature , vol.435 , pp. 759-764
    • Achlioptas, D.1    Naor, A.2    Peres, Y.3
  • 5
    • 10044219900 scopus 로고    scopus 로고
    • An improved deterministic local search algorithm for 3-SAT
    • Brueggemann T, Kern W (2004) An improved deterministic local search algorithm for 3-SAT. Theoretical Computer Science 329(1-3):303-313
    • (2004) Theoretical Computer Science , vol.329 , Issue.1-3 , pp. 303-313
    • Brueggemann, T.1    Kern, W.2
  • 10
    • 84881072062 scopus 로고
    • A computing procedure for quantification theory
    • Davis M, Putnam H (1960) A computing procedure for quantification theory. Journal of the ACM (JACM) 7(3):201-215
    • (1960) Journal of the ACM (JACM) , vol.7 , Issue.3 , pp. 201-215
    • Davis, M.1    Putnam, H.2
  • 18
    • 0030107173 scopus 로고    scopus 로고
    • Hard random 3-SAT problems and the Davis-Putnam procedure
    • Freeman JW (1996) Hard random 3-SAT problems and the Davis-Putnam procedure. Artificial Intelligence 81(1-2):183-198
    • (1996) Artificial Intelligence , vol.81 , Issue.1-2 , pp. 183-198
    • Freeman, J.W.1
  • 21
    • 21244441082 scopus 로고    scopus 로고
    • A machine learning evaluation of an artificial immune system
    • Glickman M, Balthrop J, Forrest S (2005) A machine learning evaluation of an artificial immune system. Evolutionary Computation 13(2):179-212
    • (2005) Evolutionary Computation , vol.13 , Issue.2 , pp. 179-212
    • Glickman, M.1    Balthrop, J.2    Forrest, S.3
  • 23
    • 84937417239 scopus 로고    scopus 로고
    • A probabilistic 3-SAT algorithm further improved. In: 19th Annual symposium on theoretical aspects of computer science (STACS)
    • Springer-Verlag, NY
    • Hofmeister T, Schöning U, Schuler R, Watanabe O (2002) A probabilistic 3-SAT algorithm further improved. In: 19th Annual symposium on theoretical aspects of computer science (STACS), Lecture Notes in Computer Science, vol 2285. Springer-Verlag, NY, pp 192-202
    • (2002) Lecture Notes in Computer Science , vol.2285 , pp. 192-202
    • Hofmeister, T.1    Schöning, U.2    Schuler, R.3    Watanabe, O.4
  • 24
    • 0003496659 scopus 로고    scopus 로고
    • An immunological model of distributed detection and its application to computer security
    • Ph.D. thesis, University of New Mexico, Albuquerque, NM
    • Hofmeyr SA (1999) An immunological model of distributed detection and its application to computer security. Ph.D. thesis, University of New Mexico, Albuquerque, NM
    • (1999)
    • Hofmeyr, S.A.1
  • 26
    • 0043080078 scopus 로고    scopus 로고
    • How good are branching rules in DPLL
    • Ouyang M (1998) How good are branching rules in DPLL. Discrete Applied Mathematics 89(1-3):281-286
    • (1998) Discrete Applied Mathematics , vol.89 , Issue.1-3 , pp. 281-286
    • Ouyang, M.1
  • 27
    • 0027532161 scopus 로고
    • Predicting the size of the T-cell receptor and antibody combining region from consideration of efficient self-nonself discrimination
    • Percus JK, Percus OE, Perelson AS (1993) Predicting the size of the T-cell receptor and antibody combining region from consideration of efficient self-nonself discrimination. Proc Natl Acad Sci USA 90:1691-1695
    • (1993) Proc Natl Acad Sci USA , vol.90 , pp. 1691-1695
    • Percus, J.K.1    Percus, O.E.2    Perelson, A.S.3
  • 28
    • 34547290312 scopus 로고    scopus 로고
    • An artificial immune system approach to preserving security in computer networks
    • Master's thesis, Norges Teknisk-Naturvitenskapelige Universitet
    • Ranang MT (2002) An artificial immune system approach to preserving security in computer networks. Master's thesis, Norges Teknisk-Naturvitenskapelige Universitet
    • (2002)
    • Ranang, M.T.1
  • 32
    • 1442339891 scopus 로고    scopus 로고
    • Anomaly detection using negative selection based on the r-contiguous matching rule
    • In: Unversity of Kent at Canterbury Printing Unit
    • Singh S (2002) Anomaly detection using negative selection based on the r -contiguous matching rule. In: Proceedings of the 1st international conference on artificial immune systems (ICARIS). Unversity of Kent at Canterbury Printing Unit, pp 99-106
    • (2002) Proceedings of the 1st International Conference on Artificial Immune Systems (ICARIS) , pp. 99-106
    • Singh, S.1
  • 40
    • 44649136276 scopus 로고    scopus 로고
    • Boolean satisfiability - Combinatorics and algorithms
    • Welzl E (2005) Boolean satisfiability - combinatorics and algorithms. Lecture Notes. http://www.inf.ethz.ch/~emo/SmallPieces/SAT.ps
    • (2005) Lecture Notes
    • Welzl, E.1
  • 41
    • 84868256861 scopus 로고    scopus 로고
    • Generating optimal repertoire of antibody strings in an artificial immune system
    • In: Springer Verlag, NY
    • Wierzchoń ST (2000a) Generating optimal repertoire of antibody strings in an artificial immune system. In: Intelligent Information Systems. Springer Verlag, NY, pp 119-133
    • (2000) Intelligent Information Systems , pp. 119-133
    • Wierzchoń, S.T.1
  • 42
    • 0742300833 scopus 로고    scopus 로고
    • Discriminative power of the receptors activated by k-contiguous bits rule
    • Wierzchoń ST (2000b) Discriminative power of the receptors activated by k-contiguous bits rule. Journal of Computer Science and Technology 1(3):1-13
    • (2000) Journal of Computer Science and Technology , vol.1 , Issue.3 , pp. 1-13
    • Wierzchoń, S.T.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.