Self-Nonself Discrimination in a Computer
SP '94 Proceedings of the 1994 IEEE Symposium on Security and Privacy
An immunological model of distributed detection and its application to computer security
An immunological model of distributed detection and its application to computer security
A study of artificial immune systems applied to anomaly detection
A study of artificial immune systems applied to anomaly detection
Estimating the detector coverage in a negative selection algorithm
GECCO '05 Proceedings of the 7th annual conference on Genetic and evolutionary computation
Negative selection algorithms: from the thymus to v-detector
Negative selection algorithms: from the thymus to v-detector
Revisiting Negative Selection Algorithms
Evolutionary Computation
Satellite-derived land-cover classification using immune based mining approach
ACOS'06 Proceedings of the 5th WSEAS international conference on Applied computer science
ACOS'06 Proceedings of the 5th WSEAS international conference on Applied computer science
A comparative study of real-valued negative selection to statistical anomaly detection techniques
ICARIS'05 Proceedings of the 4th international conference on Artificial Immune Systems
Learning and optimization using the clonal selection principle
IEEE Transactions on Evolutionary Computation
Hi-index | 0.00 |
A parameter called overlap rate is proposed to control the number of valid detectors generated for a T-detector Maturation Algorithm. The achieved algorithm TMA-OR can reduce the number of detectors for abnormal detection. Experiment results show that TMA-OR is more effective than V-detector algorithms such as naive estimate and hypothesis testing method and can be applied on different data sets.