An intrusion detection system based on normalized mutual information antibodies feature selection and adaptive quantum artificial immune system

Z Ling, ZJ Hao - International Journal on Semantic Web and …, 2022 - igi-global.com
The intrusion detection system (IDS) has lower speed, less adaptability and lower detection
accuracy especially for small samples sets. This paper presents a detection model based on …

[HTML][HTML] Multiresolution dendritic cell algorithm for network anomaly detection

D Limon-Cantu, V Alarcon-Aquino - PeerJ Computer Science, 2021 - peerj.com
Anomaly detection in computer networks is a complex task that requires the distinction of
normality and anomaly. Network attack detection in information systems is a constant …

EpiDCA: Adaptation and implementation of a danger theory algorithm for event-based epidemiological surveillance

B Boudoua, M Roche, M Teisseire, A Tran - Computers and Electronics in …, 2025 - Elsevier
Amidst the overwhelming volume of health-related data available, diverse epidemiological
surveillance strategies have been adopted to swiftly detect outbreak events. These …

DCW-RNN: Improving class level metrics for software vulnerability detection using artificial immune system with clock-work recurrent neural network

CB Şahin - 2021 International Conference on INnovations in …, 2021 - ieeexplore.ieee.org
As the defenses evolve, so do the solutions to a software vulnerability. The primary reason
for security incidents, eg, cyber-attacks, originates from software vulnerabilities. It is …

Towards a hybrid immune algorithm based on danger theory for database security

W Said, AM Mostafa - IEEE Access, 2020 - ieeexplore.ieee.org
In Databases, the most prevalent cause of data breaches comes from insiders who misuse
their account privileges. Due to the difficulty of discovering such breaches, an adaptive …

[HTML][HTML] HPB3C-3PG algorithm: A new hybrid global optimization algorithm and its application to plant classification

S Ghosh, A Singh, S Kumar - Ecological Informatics, 2024 - Elsevier
This paper proposes a hybrid bio-inspired search and optimization algorithm that combines
the strengths of the PB3C (Parallel Big Bang Big Crunch) and 3PGA (3 Parent Genetic …

Design of distributed network intrusion prevention system based on Spark and P2DR models

L An, J Qiu, H Zhang, C Liu - Cluster Computing, 2024 - Springer
The commonly used method for network intrusion is based on pattern matching systems, but
these systems do not have high detection accuracy when facing large-scale high-speed …

Illegal Intrusion Detection for In-Vehicle CAN Bus Based on Immunology Principle

X Li, F Liu, D Li, T Hu, M Han - Symmetry, 2022 - mdpi.com
The controller area network (CAN) bus has become one of the most commonly used
protocols in automotive networks. Some potential attackers inject malicious data packets into …

NDAMM: a numerical differentiation-based artificial macrophage model for anomaly detection

Z Ming, Y Liang, W Zhou - Applied Intelligence, 2023 - Springer
Anomaly detection is a significant issue that has attracted considerable research. The
artificial immune system offers strong pattern recognition ability, adaptability and dynamic …

[HTML][HTML] Technology, Science and Culture: A Global Vision, Volume IV

LR Hernández, MAS Meneses - … Culture-A Global Vision, Volume IV, 2023 - intechopen.com
Chemistry is not a stagnant scientific discipline; on the contrary, chemistry is a continuously
advancing activity. Indeed, the XXI century is registering the emergence of several highly …