The use of computational intelligence in intrusion detection systems: A review

SX Wu, W Banzhaf - Applied soft computing, 2010 - Elsevier
Intrusion detection based upon computational intelligence is currently attracting
considerable interest from the research community. Characteristics of computational …

[HTML][HTML] Application of artificial immune systems in advanced manufacturing

R Pinto, G Gonçalves - Array, 2022 - Elsevier
In recent years, the application of Advanced Manufacturing Technologies (AMT) in industrial
processes represents the introduction of different Advanced Manufacturing Systems (AMS) …

Systematic construction of anomaly detection benchmarks from real data

AF Emmott, S Das, T Dietterich, A Fern… - Proceedings of the ACM …, 2013 - dl.acm.org
Research in anomaly detection suffers from a lack of realistic and publicly-available problem
sets. This paper discusses what properties such problem sets should possess. It then …

[图书][B] Natural computing algorithms

A Brabazon, M O'Neill, S McGarraghy - 2015 - Springer
The field of natural computing has been the focus of a substantial research effort in recent
decades. One particular strand of this concerns the development of computational …

[PDF][PDF] The dendritic cell algorithm

J Greensmith - 2007 - Citeseer
Artificial immune systems are a collection of algorithms inspired by the human immune
system. Over the past 15 years, extensive research has been performed regarding the …

The deterministic dendritic cell algorithm

J Greensmith, U Aickelin - International conference on artificial immune …, 2008 - Springer
Abstract The Dendritic Cell Algorithm is an immune-inspired algorithm originally based on
the function of natural dendritic cells. The original instantiation of the algorithm is a highly …

A meta-analysis of the anomaly detection problem

A Emmott, S Das, T Dietterich, A Fern… - arXiv preprint arXiv …, 2015 - arxiv.org
This article provides a thorough meta-analysis of the anomaly detection problem. To
accomplish this we first identify approaches to benchmarking anomaly detection algorithms …

Information fusion for anomaly detection with the dendritic cell algorithm

J Greensmith, U Aickelin, G Tedesco - Information Fusion, 2010 - Elsevier
Dendritic cells are antigen presenting cells that provide a vital link between the innate and
adaptive immune system, providing the initial detection of pathogenic invaders. Research …

Why is this an anomaly? Explaining anomalies using sequential explanations

T Mokoena, T Celik, V Marivate - Pattern Recognition, 2022 - Elsevier
In most applications, anomaly detection operates in an unsupervised mode by looking for
outliers hoping that they are anomalies. Unfortunately, most anomaly detectors do not come …

A survey of the dendritic cell algorithm

Z Chelly, Z Elouedi - Knowledge and Information Systems, 2016 - Springer
The dendritic cell algorithm (DCA) is a classification algorithm based on the functioning of
natural immune dendritic cells. Recently, the DCA has caught the attention of researchers …