The use of computational intelligence in intrusion detection systems: A review

SX Wu, W Banzhaf - Applied soft computing, 2010 - Elsevier
Intrusion detection based upon computational intelligence is currently attracting
considerable interest from the research community. Characteristics of computational …

Fundamentals of natural computing: an overview

LN de Castro - Physics of Life Reviews, 2007 - Elsevier
Natural computing is a terminology introduced to encompass three classes of methods:(1)
those that take inspiration from nature for the development of novel problem-solving …

[图书][B] Fundamentals of natural computing: basic concepts, algorithms, and applications

LN De Castro - 2006 - taylorfrancis.com
Natural computing brings together nature and computing to develop new computational
tools for problem solving; to synthesize natural patterns and behaviors in computers; and to …

Introducing dendritic cells as a novel immune-inspired algorithm for anomaly detection

J Greensmith, U Aickelin, S Cayzer - … Banff, Alberta, Canada, August 14-17 …, 2005 - Springer
Dendritic cells are antigen presenting cells that provide a vital link between the innate and
adaptive immune system. Research into this family of cells has revealed that they perform …

Immune system approaches to intrusion detection–a review

J Kim, PJ Bentley, U Aickelin, J Greensmith… - Natural computing, 2007 - Springer
The use of artificial immune systems in intrusion detection is an appealing concept for two
reasons. First, the human immune system provides the human body with a high level of …

[PDF][PDF] The dendritic cell algorithm

J Greensmith - 2007 - Citeseer
Artificial immune systems are a collection of algorithms inspired by the human immune
system. Over the past 15 years, extensive research has been performed regarding the …

Artificial immune systems

U Aickelin, D Dasgupta, F Gu - Search Methodologies: Introductory …, 2013 - Springer
The biological immune system is a robust, complex, adaptive system that defends the body
from foreign pathogens. It is able to categorize all cells (or molecules) within the body as self …

Data mining-based intrusion detectors

SY Wu, E Yen - Expert Systems with Applications, 2009 - Elsevier
With popularization of internet, internet attack cases are increasing, and attack methods
differs each day, thus information safety problem has became a significant issue all over the …

An efficient proactive artificial immune system based anomaly detection and prevention system

P Saurabh, B Verma - Expert Systems with Applications, 2016 - Elsevier
Abstract Artificial Immune System (AIS) is inspired from Biological Immune System (BIS) and
demonstrates a lot of interesting facets and intelligence that include self-learning, self …

Articulation and clarification of the dendritic cell algorithm

J Greensmith, U Aickelin, J Twycross - Artificial Immune Systems: 5th …, 2006 - Springer
Abstract The Dendritic Cell algorithm (DCA) is inspired by recent work in innate immunity. In
this paper a formal description of the DCA is given. The DCA is described in detail, and its …