The use of computational intelligence in intrusion detection systems: A review

SX Wu, W Banzhaf - Applied soft computing, 2010 - Elsevier
Intrusion detection based upon computational intelligence is currently attracting
considerable interest from the research community. Characteristics of computational …

Advances in artificial immune systems

D Dasgupta - IEEE computational intelligence magazine, 2006 - ieeexplore.ieee.org
During the last decade, the field of artificial immune system (A1S) is progressing slowly and
steadily as a branch of computational intelligence (CI). There has been increasing interest in …

[图书][B] Immunological computation: theory and applications

D Dasgupta, F Nino - 2008 - taylorfrancis.com
Clearly, nature has been very effective in creating organisms that are capable of protecting
themselves against a wide variety of pathogens such as bacteria, fungi, and parasites. The …

Information fusion for anomaly detection with the dendritic cell algorithm

J Greensmith, U Aickelin, G Tedesco - Information Fusion, 2010 - Elsevier
Dendritic cells are antigen presenting cells that provide a vital link between the innate and
adaptive immune system, providing the initial detection of pathogenic invaders. Research …

Applications of artificial immune systems to computer security: A survey

DAB Fernandes, MM Freire, PAP Fazendeiro… - Journal of Information …, 2017 - Elsevier
For the last two decades, artificial immune systems have been studied in various fields of
knowledge. They were shown to be particularly effective tools at detecting anomalous …

Artificial immune systems

J Greensmith, A Whitbrook, U Aickelin - Handbook of Metaheuristics, 2010 - Springer
The human immune system has numerous properties that make it ripe for exploitation in the
computational domain, such as robustness and fault tolerance, and many different …

Sensing danger: Innate immunology for intrusion detection

U Aickelin, J Greensmith - Information Security Technical Report, 2007 - Elsevier
The immune system provides an ideal metaphor for anomaly detection in general and
computer securities in particular. Based on this idea, artificial immune systems have been …

The application of a dendritic cell algorithm to a robotic classifier

R Oates, J Greensmith, U Aickelin, J Garibaldi… - … Immune Systems: 6th …, 2007 - Springer
The dendritic cell algorithm is an immune-inspired technique for processing time-dependant
data. Here we propose it as a possible solution for a robotic classification problem. The …

Danger is ubiquitous: Detecting malicious activities in sensor networks using the dendritic cell algorithm

J Kim, P Bentley, C Wallenta, M Ahmed… - Artificial Immune Systems …, 2006 - Springer
There is a list of unique immune features that are currently absent from the existing artificial
immune systems and other intelligent paradigms. We argue that some of AIS features can be …

[PDF][PDF] Integrated innate and adaptive artificial immune systems applied to process anomaly detection

JP Twycross - 2007 - Citeseer
This thesis explores the design and application of artificial immune systems (AISs), problem-
solving systems inspired by the human and other immune systems. AISs to date have largely …