-
1
-
-
0027961889
-
Self-Nonself Discrimination in a Computer
-
Oakland, USA, pp
-
Forrest, S, Perelson, A, Allen, L and Cherukuri, R (1994). "Self-Nonself Discrimination in a Computer". In Proc. of IEEE Symposium on Research in Security and Privacy. Oakland, USA, pp. 202-212.
-
(1994)
Proc. of IEEE Symposium on Research in Security and Privacy
, pp. 202-212
-
-
Forrest, S.1
Perelson, A.2
Allen, L.3
Cherukuri, R.4
-
2
-
-
0015956495
-
Towards a network theory of the immune system
-
Jerne, N. (1974) "Towards a network theory of the immune system," Annals of Immunology, vol. 125, pp. 373-389)
-
(1974)
Annals of Immunology
, vol.125
, pp. 373-389
-
-
Jerne, N.1
-
3
-
-
77949584002
-
-
de Castro, L. N. and F. J. Von Zuben. (2000) The clonal selection algorithm with engineering applications. In Proc. of GECCO 00. Workshop on Artificial Immune Systems and Their Applications. Pages 36-37
-
de Castro, L. N. and F. J. Von Zuben. (2000) "The clonal selection algorithm with engineering applications". In Proc. of GECCO" 00. Workshop on Artificial Immune Systems and Their Applications. Pages 36-37
-
-
-
-
4
-
-
0028201732
-
Tolerance, danger and the extended family
-
P. Matzinger., (1994), Tolerance, danger and the extended family. Annual Reviews in Immunology, 12:991-1045.
-
(1994)
Annual Reviews in Immunology
, vol.12
, pp. 991-1045
-
-
Matzinger, P.1
-
5
-
-
0037066427
-
The Danger Model: A Renewed Sense of Self
-
P. Matzinger, (2002), "The Danger Model: A Renewed Sense of Self, Science, 296, pp. 301-305.
-
(2002)
Science
, vol.296
, pp. 301-305
-
-
Matzinger, P.1
-
6
-
-
26944469543
-
Introducing Dendritic Cells as a Novel Immune-Inspired Algorithm for Intrusion Detection
-
Springer-Verlag, pp
-
Greensmith, J., Aickelin, U. and Cayzer, S. (2005) Introducing Dendritic Cells as a Novel Immune-Inspired Algorithm for Intrusion Detection, In Proc. of ICARIS-05, Springer-Verlag, pp. 153-167.
-
(2005)
Proc. of ICARIS-05
, pp. 153-167
-
-
Greensmith, J.1
Aickelin, U.2
Cayzer, S.3
-
7
-
-
35248825128
-
-
U. Aickelin, P. Bentley, S. Cayzer, J. Kim, and J. (2003) McLeod. Danger theory: The link between AIS and IDS. In Proc. of the 2nd International Conference on Artificial Immune Systems (ICARIS), LNCS 2787, pp. 147-155. Springer-Verlag.
-
U. Aickelin, P. Bentley, S. Cayzer, J. Kim, and J. (2003) McLeod. Danger theory: The link between AIS and IDS. In Proc. of the 2nd International Conference on Artificial Immune Systems (ICARIS), LNCS 2787, pp. 147-155. Springer-Verlag.
-
-
-
-
8
-
-
77949597341
-
The DCA SOMe comparison: A comparative study between two biologically-inspired algorithms. Evolutionary Intelligence: Special Issue on Artificial Immune Systems
-
accepted for publication
-
J. Greensmith, U. Aickelin, and J. Feyereisl. (2008) The DCA SOMe comparison: A comparative study between two biologically-inspired algorithms. Evolutionary Intelligence: Special Issue on Artificial Immune Systems, accepted for publication.
-
(2008)
-
-
Greensmith, J.1
Aickelin, U.2
Feyereisl, J.3
-
12
-
-
33751021110
-
Danger Is Ubiquitous: Detecting Malicous Activities in Sensor Networks Using the Dendritic Cell Algorithm, ICARIS
-
Jungwon Kim, Peter Bentley, and Christian Wallenta, (2006), "Danger Is Ubiquitous: Detecting Malicous Activities in Sensor Networks Using the Dendritic Cell Algorithm", ICARIS, LNCS 4163, pp. 390-403.
-
(2006)
LNCS
, vol.4163
, pp. 390-403
-
-
Kim, J.1
Bentley, P.2
Wallenta, C.3
-
13
-
-
72149127416
-
Improving the reliability of real time embedded systems using innate immune techniques
-
Special Issue on Artificial Immune Systems
-
N. Lay and I. Bate. (2008)Improving the reliability of real time embedded systems using innate immune techniques. Evolutionary Intelligence: Special Issue on Artificial Immune Systems.
-
(2008)
Evolutionary Intelligence
-
-
Lay, N.1
Bate, I.2
-
14
-
-
38349072232
-
The application of a dendritic cell algorithm to a robotic classifier
-
Proc. of the 6th International Conference on Artificial Immune Systems ICARIS
-
R. Oates, J. Greensmith, U. Aickelin, J. Garibaldi, and G. Kendall. (2007), The application of a dendritic cell algorithm to a robotic classifier. In Proc. of the 6th International Conference on Artificial Immune Systems (ICARIS), LNCS 4628,pp.204-215.
-
(2007)
LNCS
, vol.4628
, pp. 204-215
-
-
Oates, R.1
Greensmith, J.2
Aickelin, U.3
Garibaldi, J.4
Kendall, G.5
-
16
-
-
34547278626
-
Dendritic cells for anomaly detection
-
PP
-
J. Greensmith, J. Twy cross, and U. Aickelin, (2006), "Dendritic cells for anomaly detection", In IEEE Congress on Evolutionary Computation (CEC 2006), PP. 664-671.
-
(2006)
IEEE Congress on Evolutionary Computation (CEC
, pp. 664-671
-
-
Greensmith, J.1
Twy cross, J.2
Aickelin, U.3
-
17
-
-
34548290911
-
Immune Inspired Adaptable Error Detection for Automated Teller Machines
-
Pp
-
R. De Lemos, J. Timmis, S. Forrest and M. Ayara, (2007), "Immune Inspired Adaptable Error Detection for Automated Teller Machines", IEEE SMC Part C: Applications and Reviews. 37(5). Pp. 873-886.
-
(2007)
IEEE SMC Part C: Applications and Reviews
, vol.37
, Issue.5
, pp. 873-886
-
-
De Lemos, R.1
Timmis, J.2
Forrest, S.3
Ayara, M.4
-
18
-
-
77949647465
-
-
Emilie Lundin, Hakan Kvarnstr om and Erland Jonsson. A synthetic fraud data generation methodology. (2002), In Proceedings of the Fourth International Conference on Information and Communications Security (ICICS 2002), Singapore, December 9-12, 2002. 2513 of Lecture Notes in Computer Science, Springer-Verlag.
-
Emilie Lundin, Hakan Kvarnstr "om and Erland Jonsson. A synthetic fraud data generation methodology. (2002), In Proceedings of the Fourth International Conference on Information and Communications Security (ICICS 2002), Singapore, December 9-12, 2002. Volume 2513 of Lecture Notes in Computer Science, Springer-Verlag.
-
-
-
|