[图书][B] Natural computing algorithms

A Brabazon, M O'Neill, S McGarraghy - 2015 - Springer
The field of natural computing has been the focus of a substantial research effort in recent
decades. One particular strand of this concerns the development of computational …

How a well-adapted immune system is organized

A Mayer, V Balasubramanian… - Proceedings of the …, 2015 - National Acad Sciences
The repertoire of lymphocyte receptors in the adaptive immune system protects organisms
from diverse pathogens. A well-adapted repertoire should be tuned to the pathogenic …

Immunity-based systems: A survey

D Dasgupta, N Attoh-Okine - 1997 IEEE International …, 1997 - ieeexplore.ieee.org
Biological systems such as human beings can be regarded as sophisticated information
processing systems, and can be expected to provide inspiration for various ideas to science …

A formal framework for positive and negative detection schemes

F Esponda, S Forrest, P Helman - IEEE Transactions on …, 2004 - ieeexplore.ieee.org
In anomaly detection, the normal behavior of a process is characterized by a model, and
deviations from the model are called anomalies. In behavior-based approaches to anomaly …

[PDF][PDF] The dendritic cell algorithm

J Greensmith - 2007 - Citeseer
Artificial immune systems are a collection of algorithms inspired by the human immune
system. Over the past 15 years, extensive research has been performed regarding the …

Intrusion detection using variable-length audit trail patterns

A Wespi, M Dacier, H Debar - … , RAID 2000 Toulouse, France, October 2–4 …, 2000 - Springer
Audit trail patterns generated on behalf of a Unix process can be used to model the process
behavior. Most of the approaches proposed so far use a table of fixed-length patterns to …

A combined negative selection algorithm–particle swarm optimization for an email spam detection system

I Idris, A Selamat, NT Nguyen, S Omatu… - … applications of artificial …, 2015 - Elsevier
Email is a convenient means of communication throughout the entire world today. The
increased popularity of email spam in both text and images requires a real-time protection …

How do we evaluate artificial immune systems?

SM Garrett - Evolutionary computation, 2005 - direct.mit.edu
Abstract The field of Artificial Immune Systems (AIS) concerns the study and development of
computationally interesting abstractions of the immune system. This survey tracks the …

An immune algorithm for protein structure prediction on lattice models

V Cutello, G Nicosia, M Pavone… - IEEE transactions on …, 2007 - ieeexplore.ieee.org
We present an immune algorithm (IA) inspired by the clonal selection principle, which has
been designed for the protein structure prediction problem (PSP). The proposed IA employs …

Lad: Localization anomaly detection for wireless sensor networks

W Du, L Fang, P Ningi - 19th IEEE International Parallel and …, 2005 - ieeexplore.ieee.org
In wireless sensor networks (WSNs), sensors' locations play a critical role in many
applications. Having a GPS receiver on every sensor node is costly. In the past, a number of …