The use of computational intelligence in intrusion detection systems: A review

SX Wu, W Banzhaf - Applied soft computing, 2010 - Elsevier
Intrusion detection based upon computational intelligence is currently attracting
considerable interest from the research community. Characteristics of computational …

Anomaly detection for discrete sequences: A survey

V Chandola, A Banerjee… - IEEE transactions on …, 2010 - ieeexplore.ieee.org
This survey attempts to provide a comprehensive and structured overview of the existing
research for the problem of detecting anomalies in discrete/symbolic sequences. The …

[HTML][HTML] SEIQRS model for the transmission of malicious objects in computer network

BK Mishra, N Jha - Applied Mathematical Modelling, 2010 - Elsevier
Susceptible (S)–exposed (E)–infectious (I)–quarantined (Q)–recovered (R) model for the
transmission of malicious objects in computer network is formulated. Thresholds, equilibria …

A taxonomy of biologically inspired research in computer networking

M Meisel, V Pappas, L Zhang - Computer Networks, 2010 - Elsevier
The natural world is enormous, dynamic, incredibly diverse, and highly complex. Despite the
inherent challenges of surviving in such a world, biological organisms evolve, self-organize …

Artificial immune systems-models, algorithms and applications

JR Al-Enezi, MF Abbod, S Alsharhan - 2010 - bura.brunel.ac.uk
Artificial Immune Systems (AIS) are computational paradigms that belong to the
computational intelligence family and are inspired by the biological immune system. During …

Fuzzy epidemic model for the transmission of worms in computer network

BK Mishra, SK Pandey - Nonlinear Analysis: Real World Applications, 2010 - Elsevier
An e-epidemic SIRS (susceptible–infectious–recovered–susceptible) model for the fuzzy
transmission of worms in computer network is formulated. We have analyzed the …

Design of an artificial immune system for fault detection: a negative selection approach

CA Laurentys, G Ronacher, RM Palhares… - Expert Systems with …, 2010 - Elsevier
This paper presents a methodology that designs a fault detection Artificial Immune System
(AIS) based on immune theory. The fault detection is a challenging problem due to …

Baldwinian learning in clonal selection algorithm for optimization

M Gong, L Jiao, L Zhang - Information Sciences, 2010 - Elsevier
Artificial immune systems are a kind of new computational intelligence methods which draw
inspiration from the human immune system. Most immune system inspired optimization …

A modified version of a T‐Cell Algorithm for constrained optimization problems

VS Aragón, SC Esquivel… - International Journal for …, 2010 - Wiley Online Library
In this paper, we present a heuristic inspired on the T‐Cell model of the immune system (ie
an artificial immune system). The proposed approach (called T‐Cell) is used for solving …

Chaotic-based hybrid negative selection algorithm and its applications in fault and anomaly detection

I Aydin, M Karakose, E Akin - Expert Systems with Applications, 2010 - Elsevier
This paper proposes a new negative selection algorithm method that uses chaotic maps for
parameter selection. This has been done by using of chaotic number generators each time a …