Artficial Immune Systems and Their Applications
Artficial Immune Systems and Their Applications
Discriminating and visualizing anomalies using negative selection and self-organizing maps
GECCO '05 Proceedings of the 7th annual conference on Genetic and evolutionary computation
Is negative selection appropriate for anomaly detection?
GECCO '05 Proceedings of the 7th annual conference on Genetic and evolutionary computation
The application of antigenic search techniques to time series forecasting
GECCO '05 Proceedings of the 7th annual conference on Genetic and evolutionary computation
Applicability issues of the real-valued negative selection algorithms
Proceedings of the 8th annual conference on Genetic and evolutionary computation
Proceedings of the 9th annual conference on Genetic and evolutionary computation
Credit Card Fraud Detection with Artificial Immune System
ICARIS '08 Proceedings of the 7th international conference on Artificial Immune Systems
A comparative study of real-valued negative selection to statistical anomaly detection techniques
ICARIS'05 Proceedings of the 4th international conference on Artificial Immune Systems
An immunity-based technique to characterize intrusions in computernetworks
IEEE Transactions on Evolutionary Computation
Idiotypic Immune Networks in Mobile-Robot Control
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics
Journal of Intelligent Manufacturing
Hi-index | 0.00 |
Artificial Immune System (AIS) algorithms have been used for well over a decade to detect anomalies in computer security and data collection applications. They have also been used for real-time industrial fault detection applications, where they typically outperform traditional limit-checking algorithms in terms of anomaly detection ability. However, large computing overhead and large memory requirements make traditional AIS algorithms unsuitable for many applications. In this paper we propose a new AIS algorithm called Parsimonious Detector Set Algorithm which promises to greatly limit the effect of both constraints and make AIS algorithms suitable for a wider range of applications.