HN Eke, A Petrovski, H Ahriz - … of the 12th international conference on …, 2019 - dl.acm.org
Advanced Persistent Threats (APTs) have been a major challenge in securing both Information Technology (IT) and Operational Technology (OT) systems. Due to their …
GC Silva, D Dasgupta - Handbook on Computational Intelligence …, 2016 - World Scientific
This report aims to bring the state-of-the-art of artificial immune systems (AISs) and the literature review during the last five years, presenting some Immune-based methods, their …
W Ma, D Tran, D Sharma - 2009 Fourth International …, 2009 - ieeexplore.ieee.org
Nowadays, detecting and filtering are still the most feasible ways of fighting spam emails. There are many reasonably successful spam email filters in operation. However, proactively …
For the last decade it has become commonplace to evaluate machine learning techniques for network based intrusion detection on the KDD Cup'99 data set. This data set has served …
C Wen, L Tao - Information Sciences, 2017 - Elsevier
The performance of negative selection algorithm (NSA) is affected by several parameters such as its self radius and expected coverage. Traditionally, most of the parameters are …
A Sharma, D Sharma - … Conference, ICARIS 2011, Cambridge, UK, July 18 …, 2011 - Springer
Clonal selection principle based CLONALG is one of the most popular artificial immune system (AIS) models. It has been proposed to perform pattern matching and optimization …
X Xiao, T Li, R Zhang - Applied Intelligence, 2015 - Springer
Negative selection algorithms are important for artificial immune systems to produce detectors. But there are problems such as high time complexity, large number of detectors, a …
Important Note: The field of Artificial Immune Systems (AIS) is becoming more popular and AIS-based works spanning from theoretical modeling and simulation to wide variety of …
J Shen, J Wang - IECON 2011-37th Annual Conference of the …, 2011 - ieeexplore.ieee.org
With the increasing network attacks worldwide, intrusion detection (ID) has become a hot research topic in last decade. Technologies such as neural networks and fuzzy logic have …