Artificial Immune Systems: A New Computational Intelligence Paradigm
Artificial Immune Systems: A New Computational Intelligence Paradigm
Coverage and Generalization in an Artificial Immune System
GECCO '02 Proceedings of the Genetic and Evolutionary Computation Conference
Self-Nonself Discrimination in a Computer
SP '94 Proceedings of the 1994 IEEE Symposium on Security and Privacy
An immunological model of distributed detection and its application to computer security
An immunological model of distributed detection and its application to computer security
Architecture for an Artificial Immune System
Evolutionary Computation
The effect of binary matching rules in negative selection
GECCO'03 Proceedings of the 2003 international conference on Genetic and evolutionary computation: PartI
An immunological approach to change detection: algorithms, analysis and implications
SP'96 Proceedings of the 1996 IEEE conference on Security and privacy
A formal framework for positive and negative detection schemes
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics
Revisiting Negative Selection Algorithms
Evolutionary Computation
Discriminating self from non-self with finite mixtures of multivariate Bernoulli distributions
Proceedings of the 10th annual conference on Genetic and evolutionary computation
Evolving boundary detector for anomaly detection
Expert Systems with Applications: An International Journal
Review Article: Recent Advances in Artificial Immune Systems: Models and Applications
Applied Soft Computing
Application of the feature-detection rule to the Negative Selection Algorithm
Expert Systems with Applications: An International Journal
Hi-index | 0.00 |
Permutation masks were proposed for reducing the number of holes in Hamming negative selection when applying the r-contiguous or r-chunk matching rule. Here, we show that (randomly determined) permutation masks re-arrange the semantic representation of the underlying data and therefore shatter self-regions. As a consequence, detectors do not cover areas around self regions, instead they cover randomly distributed elements across the space. In addition, we observe that the resulting holes occur in regions where actually no self regions should occur.