-
2
-
-
0034546374
-
Architecture for an artificial immune system
-
S. Hofmeyr and S. Forrest, "Architecture for an artificial immune system," Evolutionary Computation, vol. 8, no. 4, pp. 443-473, 2000.
-
(2000)
Evolutionary Computation
, vol.8
, Issue.4
, pp. 443-473
-
-
Hofmeyr, S.1
Forrest, S.2
-
3
-
-
0036613003
-
An Artificial Immune System Architecture for Computer Security Applications
-
June
-
P. Harmer, G. Williams, P.D.and Gnusch, and G. Lamont, "An Artificial Immune System Architecture for Computer Security Applications," IEEE Transactions on Evolutionary Computation, vol. 6, pp. 252-280, June 2002.
-
(2002)
IEEE Transactions on Evolutionary Computation
, vol.6
, pp. 252-280
-
-
Harmer, P.1
Williams, G.2
Gnusch, P.D.3
Lamont, G.4
-
4
-
-
0002606747
-
A biologically inspired immune system for computers
-
July
-
J. Kephart, "A biologically inspired immune system for computers," in Proceedings of Artificial Life, (Cambridge, MA), pp. 130-139, July 1994.
-
(1994)
Proceedings of Artificial Life, (Cambridge, MA)
, pp. 130-139
-
-
Kephart, J.1
-
5
-
-
0027961889
-
Self-nonself discrimination in a computer
-
S. Forrest, A. Perelson, L. Allen, and R. Cherukuri, "Self-nonself discrimination in a computer," in Proceedings IEEE Symposium on Research in Security and Privacy, pp. 202-212, 1994.
-
(1994)
Proceedings IEEE Symposium on Research in Security and Privacy
, pp. 202-212
-
-
Forrest, S.1
Perelson, A.2
Allen, L.3
Cherukuri, R.4
-
6
-
-
0036613083
-
An immunity-based technique to characterize intrusions in computer networks
-
June
-
D. Dagupta and F. González, "An immunity-based technique to characterize intrusions in computer networks," IEEE Transactions on Evolutionary Computation, vol. 6, pp. 281-291, June 2002.
-
(2002)
IEEE Transactions on Evolutionary Computation
, vol.6
, pp. 281-291
-
-
Dagupta, D.1
González, F.2
-
7
-
-
0037781389
-
An imunogenetic technique to detect anomalies in network traffic
-
Morgan Kaufmann Publishers, 9-13 July
-
F. González and D. Dasgupta, "An imunogenetic technique to detect anomalies in network traffic," in Proceedings of the Genetic and Evolutionary Computation Conference (GECCO), (New York), pp. 1081-1088, Morgan Kaufmann Publishers, 9-13 July 2002.
-
(2002)
Proceedings of the Genetic and Evolutionary Computation Conference (GECCO), (New York)
, pp. 1081-1088
-
-
González, F.1
Dasgupta, D.2
-
8
-
-
0028429868
-
A more biologically motivated genetic algorithm: The model and some results
-
D. Dasgupta and D. McGregor, "A more biologically motivated genetic algorithm: The model and some results," Cybernetics and Systems: An International Journal, vol. 25, no. 3, pp. 447-469, 1994.
-
(1994)
Cybernetics and Systems: An International Journal
, vol.25
, Issue.3
, pp. 447-469
-
-
Dasgupta, D.1
McGregor, D.2
-
9
-
-
0003385618
-
An anomaly detection algorithm inspired by the immune system
-
Springer-Verlag, Inc.
-
D. Dasgupta and S. Forrest, "An anomaly detection algorithm inspired by the immune system," in Artificial immune systems and their applications,, pp. 262-277, Springer-Verlag, Inc., 1999.
-
(1999)
Artificial Immune Systems and Their Applications
, pp. 262-277
-
-
Dasgupta, D.1
Forrest, S.2
-
13
-
-
84901440662
-
Combining negative selection and classification techniques for anomaly detection
-
IEEE, May
-
F. González, D. Dasgupta, and R. Kozma, "Combining negative selection and classification techniques for anomaly detection," in Proceedings of the 2002 Congress on Evolutionary Computation CEC2002, (Honolulu, HI), pp. 705-710, IEEE, May 2002.
-
(2002)
Proceedings of the 2002 Congress on Evolutionary Computation CEC2002, (Honolulu, HI)
, pp. 705-710
-
-
González, F.1
Dasgupta, D.2
Kozma, R.3
-
14
-
-
1542487517
-
A parallel implementation of the artificial immune system to handle constraints in genetic algorithms: Preliminary results
-
C. A. Coello Coello and N. Cruz Cortés, "A parallel implementation of the artificial immune system to handle constraints in genetic algorithms: preliminary results," in Proceedings of the 2002 Congress on Evolutionary Computation CEC2002, (Honolulu, HI), pp, 819-824, 2002.
-
(2002)
Proceedings of the 2002 Congress on Evolutionary Computation CEC2002, (Honolulu, HI)
, pp. 819-824
-
-
Coello Coello, C.A.1
Cruz Cortés, N.2
-
15
-
-
0038537231
-
An immuno-fuzzy approach to anomaly detection
-
to be published
-
J. Gomez, F. Gonzalez, and D. Dasgupta, "An immuno-fuzzy approach to anomaly detection," in Proceedings of The IEEE International Conference on Fuzzy Systems, (St. Louis, MO), may 2003. to be published.
-
Proceedings of the IEEE International Conference on Fuzzy Systems, (St. Louis, MO), May 2003
-
-
Gomez, J.1
Gonzalez, F.2
Dasgupta, D.3
-
16
-
-
0002614135
-
Crowding and preselection revisited
-
(R. Männer and B. Manderick, eds.), (Amsterdam), North-Holland
-
S. W. Mahfoud, "Crowding and preselection revisited," in Parallel problem solving from nature 2 (R. Männer and B. Manderick, eds.), (Amsterdam), pp. 27-36, North-Holland, 1992.
-
(1992)
Parallel Problem Solving from Nature
, vol.2
, pp. 27-36
-
-
Mahfoud, S.W.1
-
17
-
-
0000401181
-
A sequential niche technique for multimodal function optimization
-
D. Beasley, D. Bull, and R. Martin, "A sequential niche technique for multimodal function optimization," Evolutionary Computation, vol. 1, no. 2, pp. 101-125, 1993.
-
(1993)
Evolutionary Computation
, vol.1
, Issue.2
, pp. 101-125
-
-
Beasley, D.1
Bull, D.2
Martin, R.3
-
18
-
-
0002900357
-
The case against accuracy estimation for comparing induction algorithms
-
Morgan Kaufmann
-
F. Provost, T. Fawcett, and R. Kohavi, "The case against accuracy estimation for comparing induction algorithms," in Proceedings of 15th international conference on machine learning, (San Francisco, Ca), pp. 445-453, Morgan Kaufmann, 1998.
-
(1998)
Proceedings of 15th International Conference on Machine Learning, (San Francisco, Ca)
, pp. 445-453
-
-
Provost, F.1
Fawcett, T.2
Kohavi, R.3
-
22
-
-
0142095474
-
Using artificial anomalies to detect unknown and known network intrusions
-
W. Fan, W. Lee, M. Miller, S. Stolfo, and P. Chan, "Using artificial anomalies to detect unknown and known network intrusions," in Proceedings of the 1st IEEE International conference on Data Mining, pp. 123-130, 2001.
-
(2001)
Proceedings of the 1st IEEE International Conference on Data Mining
, pp. 123-130
-
-
Fan, W.1
Lee, W.2
Miller, M.3
Stolfo, S.4
Chan, P.5
|