The use of computational intelligence in intrusion detection systems: A review

SX Wu, W Banzhaf - Applied soft computing, 2010 - Elsevier
Intrusion detection based upon computational intelligence is currently attracting
considerable interest from the research community. Characteristics of computational …

Biologically inspired network systems: A review and future prospects

T Nakano - IEEE Transactions on Systems, Man, and …, 2010 - ieeexplore.ieee.org
The emerging interdisciplinary area of biologically inspired network systems research is
reviewed. Examples of such systems found in the literature are grouped into two classes: in …

A survey of artificial immune applications

J Zheng, Y Chen, W Zhang - Artificial Intelligence Review, 2010 - Springer
The artificial immune system (AIS) community has been vibrant and active for a number of
years now, producing a prolific amount of research ranging from modeling the natural …

Linguistic steganalysis based on meta features and immune mechanism

H Yang, X Cao - Chinese Journal of Electronics, 2010 - ieeexplore.ieee.org
Linguistic steganalysis depends on efficient detection features due to the diversity of syntax
and the polysemia of semantics in natural language processing. This paper presents a novel …

[PDF][PDF] 基于自组织抗体网络的电力变压器故障诊断

李中, 苑津莎, 张利伟 - 电工技术学报, 2010 - dgjsxb.ces-transaction.com
摘要仿生生物免疫系统中抗体对抗原的高效识别和记忆机理, 本文提出自组织抗体网络和抗体
生成算法用于解决电力变压器故障诊断问题. 自组织抗体网络中抗体类型与抗体浓度新定义的 …

Data mining based network intrusion detection system: A survey

RGM Helali - Novel Algorithms and Techniques in …, 2010 - Springer
Significant security problem for networked systems is hostile trespass by users or software.
Intruder is one of the most publicized threats to security. Network Intrusion Detection …

Detecting anomalous process behaviour using second generation artificial immune systems

J Twycross, U Aickelin, A Whitbrook - arXiv preprint arXiv:1006.3654, 2010 - arxiv.org
Artificial Immune Systems have been successfully applied to a number of problem domains
including fault tolerance and data mining, but have been shown to scale poorly when …

Biologically inspired anomaly detection and security control frameworks for complex heterogeneous networks

F Hashim, KS Munasinghe… - IEEE Transactions on …, 2010 - ieeexplore.ieee.org
The demand for anytime, anywhere, anyhow communications in future generation networks
necessitates a paradigm shift from independent network services into a more harmonized …

System and method for creating a pattern installation by cloning software installed another computer

SA Isaacson - US Patent 7,730,480, 2010 - Google Patents
4,918,653 A 4, 1990 Johri et al. A customized installation is created by allowing a user to
5,664.206 A* 9/1997 Murow et al................... TO4/8 select a pattern of software. Then …

Negative selection algorithms without generating detectors

M Liśkiewicz, J Textor - Proceedings of the 12th annual conference on …, 2010 - dl.acm.org
Negative selection algorithms are immune-inspired classifiers that are trained on negative
examples only. Classification is performed by generating detectors that match none of the …