The use of computational intelligence in intrusion detection systems: A review

SX Wu, W Banzhaf - Applied soft computing, 2010 - Elsevier
Intrusion detection based upon computational intelligence is currently attracting
considerable interest from the research community. Characteristics of computational …

Recent advances in artificial immune systems: models and applications

D Dasgupta, S Yu, F Nino - Applied Soft Computing, 2011 - Elsevier
The immune system is a remarkable information processing and self learning system that
offers inspiration to build artificial immune system (AIS). The field of AIS has obtained a …

[图书][B] Immunological computation: theory and applications

D Dasgupta, F Nino - 2008 - taylorfrancis.com
Clearly, nature has been very effective in creating organisms that are capable of protecting
themselves against a wide variety of pathogens such as bacteria, fungi, and parasites. The …

[PDF][PDF] The dendritic cell algorithm

J Greensmith - 2007 - Citeseer
Artificial immune systems are a collection of algorithms inspired by the human immune
system. Over the past 15 years, extensive research has been performed regarding the …

Information fusion for anomaly detection with the dendritic cell algorithm

J Greensmith, U Aickelin, G Tedesco - Information Fusion, 2010 - Elsevier
Dendritic cells are antigen presenting cells that provide a vital link between the innate and
adaptive immune system, providing the initial detection of pathogenic invaders. Research …

Artificial immune systems

J Greensmith, A Whitbrook, U Aickelin - Handbook of Metaheuristics, 2010 - Springer
The human immune system has numerous properties that make it ripe for exploitation in the
computational domain, such as robustness and fault tolerance, and many different …

Dendritic cells for SYN scan detection

J Greensmith, U Aickelin - Proceedings of the 9th annual conference on …, 2007 - dl.acm.org
Artificial immune systems have previously been applied to the problem of intrusion
detection. The aim of this research is to develop an intrusion detection system based on the …

A taxonomy of bio-inspired cyber security approaches: existing techniques and future directions

U Rauf - Arabian Journal for Science and Engineering, 2018 - Springer
After decades of deploying cyber security systems, it is a well-known fact that the existing
cyber infrastructure has numerous inherent limitations that make the maintenance of the …

An AIS-based hybrid algorithm for static job shop scheduling problem

X Qiu, HYK Lau - Journal of Intelligent Manufacturing, 2014 - Springer
A static job shop scheduling problem (JSSP) is a class of JSSP which is a combinatorial
optimization problem with the assumption of no disruptions and previously known …

A review on immune-inspired node fault detection in wireless sensor networks with a focus on the danger theory

D Widhalm, KM Goeschka, W Kastner - Sensors, 2023 - mdpi.com
The use of fault detection and tolerance measures in wireless sensor networks is inevitable
to ensure the reliability of the data sources. In this context, immune-inspired concepts offer …