The use of computational intelligence in intrusion detection systems: A review

SX Wu, W Banzhaf - Applied soft computing, 2010 - Elsevier
Intrusion detection based upon computational intelligence is currently attracting
considerable interest from the research community. Characteristics of computational …

Immune system approaches to intrusion detection–a review

J Kim, PJ Bentley, U Aickelin, J Greensmith… - Natural computing, 2007 - Springer
The use of artificial immune systems in intrusion detection is an appealing concept for two
reasons. First, the human immune system provides the human body with a high level of …

A survey on optimization metaheuristics

I Boussaïd, J Lepagnot, P Siarry - Information sciences, 2013 - Elsevier
Metaheuristics are widely recognized as efficient approaches for many hard optimization
problems. This paper provides a survey of some of the main metaheuristics. It outlines the …

[图书][B] Bio-inspired artificial intelligence: theories, methods, and technologies

D Floreano, C Mattiussi - 2008 - books.google.com
A comprehensive introduction to new approaches in artificial intelligence and robotics that
are inspired by self-organizing biological processes and structures. New approaches to …

Collaborative security: A survey and taxonomy

G Meng, Y Liu, J Zhang, A Pokluda… - ACM Computing Surveys …, 2015 - dl.acm.org
Security is oftentimes centrally managed. An alternative trend of using collaboration in order
to improve security has gained momentum over the past few years. Collaborative security is …

A review on immune-inspired node fault detection in wireless sensor networks with a focus on the danger theory

D Widhalm, KM Goeschka, W Kastner - Sensors, 2023 - mdpi.com
The use of fault detection and tolerance measures in wireless sensor networks is inevitable
to ensure the reliability of the data sources. In this context, immune-inspired concepts offer …

Integrated framework for artificial immunity-based aircraft failure detection, identification, and evaluation

MG Perhinschi, H Moncayo, J Davis - Journal of Aircraft, 2010 - arc.aiaa.org
This paper presents a novel conceptual framework for an integrated set of methodologies for
the detection, identification, and evaluation of a wide variety of failures of aircraft subsystems …

Biologically-inspired complex adaptive systems approaches to network intrusion detection

K Shafi, HA Abbass - information security technical report, 2007 - Elsevier
The pervasiveness of the computing power has made it an inevitable commodity of the
modern time. The inexorable technological advances clearly predict the continually …

Evolutionary algorithm for artificial-immune-system-based failure-detector generation and optimization

J Davis, MG Perhinschi, H Moncayo - Journal of guidance, control, and …, 2010 - arc.aiaa.org
IN RECENT years, the need for a solution to the failure detection, identification, and
evaluation (FDIE) problem for aerospace vehicles that includes all subsystems over the …

A hybrid model for immune inspired network intrusion detection

RL Fanelli - International Conference on Artificial Immune Systems, 2008 - Springer
This paper introduces a hybrid model for network intrusion detection that combines artificial
immune system methods with conventional information security methods. The Network …