T Nakano - IEEE Transactions on Systems, Man, and …, 2010 - ieeexplore.ieee.org
The emerging interdisciplinary area of biologically inspired network systems research is reviewed. Examples of such systems found in the literature are grouped into two classes: in …
J Zheng, Y Chen, W Zhang - Artificial Intelligence Review, 2010 - Springer
The artificial immune system (AIS) community has been vibrant and active for a number of years now, producing a prolific amount of research ranging from modeling the natural …
H Yang, X Cao - Chinese Journal of Electronics, 2010 - ieeexplore.ieee.org
Linguistic steganalysis depends on efficient detection features due to the diversity of syntax and the polysemia of semantics in natural language processing. This paper presents a novel …
RGM Helali - Novel Algorithms and Techniques in …, 2010 - Springer
Significant security problem for networked systems is hostile trespass by users or software. Intruder is one of the most publicized threats to security. Network Intrusion Detection …
Artificial Immune Systems have been successfully applied to a number of problem domains including fault tolerance and data mining, but have been shown to scale poorly when …
The demand for anytime, anywhere, anyhow communications in future generation networks necessitates a paradigm shift from independent network services into a more harmonized …
SA Isaacson - US Patent 7,730,480, 2010 - Google Patents
4,918,653 A 4, 1990 Johri et al. A customized installation is created by allowing a user to 5,664.206 A* 9/1997 Murow et al................... TO4/8 select a pattern of software. Then …
M Liśkiewicz, J Textor - Proceedings of the 12th annual conference on …, 2010 - dl.acm.org
Negative selection algorithms are immune-inspired classifiers that are trained on negative examples only. Classification is performed by generating detectors that match none of the …