Z Ji, D Dasgupta - Information sciences, 2009 - Elsevier
This paper describes an enhanced negative selection algorithm (NSA) called V-detector. Several key characteristics make this method a state-of-the-art advance in the decade-old …
Proper configuration of security technologies is critical to balance the needs for access and protection of information. The common practice of using a layered security architecture that …
M Bereta, T Burczyński - Information Sciences, 2009 - Elsevier
During the last decade artificial immune systems have drawn much of the researchers' attention. All the work that has been done allowed to develop many interesting algorithms …
Cet ouvrage (2e édition actualisée et augmentée) présente les fondements théoriques de la virologie informatique, les aspects algorithmiques et pratiques des virus, et les applications …
R Chao, Y Tan - 2009 international conference on …, 2009 - ieeexplore.ieee.org
A virus detection system (VDS) based on artificial immune system (AIS) is proposed in this paper. VDS at first generates the detector set from virus files in the dataset, negative …
H Wang, XZ Gao, X Huang, Z Song - … of Soft Computing: Updating the State …, 2009 - Springer
In this paper, the Particle Swarm Optimization (PSO) is used to optimize the randomly generated detectors in the Negative Selection Algorithm (NSA). In our method, with a certain …
Biologically-inspired autonomous and autonomic systems (AAS) are essentially concerned with creating self-directed and self-managing systems based on metaphors from nature and …