The use of computational intelligence in intrusion detection systems: A review

SX Wu, W Banzhaf - Applied soft computing, 2010 - Elsevier
Intrusion detection based upon computational intelligence is currently attracting
considerable interest from the research community. Characteristics of computational …

Recent advances in artificial immune systems: models and applications

D Dasgupta, S Yu, F Nino - Applied Soft Computing, 2011 - Elsevier
The immune system is a remarkable information processing and self learning system that
offers inspiration to build artificial immune system (AIS). The field of AIS has obtained a …

A survey on optimization metaheuristics

I Boussaïd, J Lepagnot, P Siarry - Information sciences, 2013 - Elsevier
Metaheuristics are widely recognized as efficient approaches for many hard optimization
problems. This paper provides a survey of some of the main metaheuristics. It outlines the …

Intrusion detection system for wireless sensor networks using danger theory immune-inspired techniques

HM Salmon, CM De Farias, P Loureiro… - International journal of …, 2013 - Springer
An IDS framework inspired in the Human Immune System to be applied in the wireless
sensor network context is proposed. It uses an improved decentralized and customized …

[PDF][PDF] Artificial immune systems: A bibliography

D Dasgupta, N Majumdar, F Nino - Computer Science Division …, 2007 - academia.edu
Important Note: The field of Artificial Immune Systems (AIS) is becoming more popular and
AIS-based works spanning from theoretical modeling and simulation to wide variety of …

[PDF][PDF] 人工免疫系统及其算法

谢克明, 谢刚, 郭红波, 续欣莹 - 2005 - jeit.ac.cn
谢克明谢刚郭红波续欣莹(太原理工大学信息工程学院太原030024) 摘要: 该文阐述了人工免疫
系统(AIS) 的基本概念, 讨论了几种典型的算法, 包括基于免疫系统基本机制的免疫算法 …

免疫学原理在入侵检测中的应用研究

赵林惠, 戴亚平, 徐立新 - 计算机应用, 2005 - joca.cn
免疫学原理在入侵检测中的应用研究 首页 期刊介绍 期刊简介 历史沿革 收录情况 获奖情况 引用
指标 编委会 期刊在线 文章推荐 过刊浏览 专辑专刊 下载排行 阅读排行 投稿指南 组稿方向 投稿 …

SHADuDT: Secure hypervisor-based anomaly detection using danger theory

R Azmi, B Pishgoo - computers & security, 2013 - Elsevier
Intrusion Detection based upon learning methods is an attractive approach in research
community. These researches have two critical concerns: secure information gathering and …

An artificial bioindicator system for network intrusion detection

C Blum, JA Lozano, PP Davidson - Artificial life, 2015 - ieeexplore.ieee.org
An artificial bioindicator system is developed in order to solve a network intrusion detection
problem. The system, inspired by an ecological approach to biological immune systems …

An Immunology Inspired Flow Control Attack Detection Using Negative Selection with R-Contiguous Bit Matching for Wireless Sensor Networks

M Zeeshan, H Javed, A Haider… - International Journal of …, 2015 - journals.sagepub.com
Wireless sensor networks (WSNs) due to their deployment in open and unprotected
environments become suspected to attacks. Most of the resource exhaustion occurs as a …