On average time complexity of evolutionary negative selection algorithms for anomaly detection
Proceedings of the first ACM/SIGEVO Summit on Genetic and Evolutionary Computation
ICARIS '09 Proceedings of the 8th International Conference on Artificial Immune Systems
Comparing Different Aging Operators
ICARIS '09 Proceedings of the 8th International Conference on Artificial Immune Systems
Proceedings of the 12th annual conference on Genetic and evolutionary computation
Immune model based approach for network intrusion detection
Proceedings of the 3rd international conference on Security of information and networks
Lattice-based artificial endocrine system
LSMS/ICSEE'10 Proceedings of the 2010 international conference on Life system modeling and simulation and intelligent computing, and 2010 international conference on Intelligent computing for sustainable energy and environment: Part III
Analyzing different variants of immune inspired somatic contiguous hypermutations
Theoretical Computer Science
On benefits and drawbacks of aging strategies for randomized search heuristics
Theoretical Computer Science
Review Article: Recent Advances in Artificial Immune Systems: Models and Applications
Applied Soft Computing
An intraday trading model based on Artificial Immune Systems
Proceedings of the 2011 conference on Neural Nets WIRN10: Proceedings of the 20th Italian Workshop on Neural Nets
Grammar-based immune programming
Natural Computing: an international journal
A T-cell algorithm for solving dynamic optimization problems
Information Sciences: an International Journal
On the analysis of the immune-inspired B-cell algorithm for the vertex cover problem
ICARIS'11 Proceedings of the 10th international conference on Artificial immune systems
Variation in artificial immune systems: hypermutations with mutation potential
ICARIS'11 Proceedings of the 10th international conference on Artificial immune systems
A review of clonal selection algorithm and its applications
Artificial Intelligence Review
Hybridization of immunological computation and fuzzy systems in surgery decision making
KES'11 Proceedings of the 15th international conference on Knowledge-based and intelligent information and engineering systems - Volume Part IV
Robust optimization by means of vegetative reproduction
ICAIS'11 Proceedings of the Second international conference on Adaptive and intelligent systems
An artificial immune classifier for credit scoring analysis
Applied Soft Computing
Secure VM for monitoring industrial process controllers
Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research
Artificial immune systems for optimisation
Proceedings of the 14th annual conference companion on Genetic and evolutionary computation
Clonal selection: an immunological algorithm for global optimization over continuous spaces
Journal of Global Optimization
A malware detection system inspired on the human immune system
ICCSA'12 Proceedings of the 12th international conference on Computational Science and Its Applications - Volume Part IV
A transitional view of immune inspired techniques for anomaly detection
IDEAL'12 Proceedings of the 13th international conference on Intelligent Data Engineering and Automated Learning
Computing longest common subsequences with the B-cell algorithm
ICARIS'12 Proceedings of the 11th international conference on Artificial Immune Systems
A negative selection approach to intrusion detection
ICARIS'12 Proceedings of the 11th international conference on Artificial Immune Systems
Mutation rate matters even when optimizing monotonic functions
Evolutionary Computation
Artificial immune systems for optimisation
Proceedings of the 15th annual conference companion on Genetic and evolutionary computation
Hi-index | 0.00 |
Over the last decade, the field of immunological computation has progressed slowly and steadily as a branch of computational intelligence. Immunological Computation: Theory and Applications presents up-to-date immunity-based computational techniques. After a brief review of fundamental immunology concepts, the book presents computational models based on the negative selection process that occurs in the thymus. It then examines immune networks, including continuous and discrete immune network models, clonal selection, hybrid models, and computational models based on danger theory. The book also discusses real-world applications for all of the models covered in each chapter.