Proceedings of the 2005 ACM symposium on Applied computing
Is negative selection appropriate for anomaly detection?
GECCO '05 Proceedings of the 7th annual conference on Genetic and evolutionary computation
How Do We Evaluate Artificial Immune Systems?
Evolutionary Computation
A Machine Learning Evaluation of an Artificial Immune System
Evolutionary Computation
Research on Object-Storage-Based Intrusion Detection
ICPADS '06 Proceedings of the 12th International Conference on Parallel and Distributed Systems - Volume 1
Decision tree classifier for network intrusion detection with GA-based feature selection
Proceedings of the 43rd annual Southeast regional conference - Volume 2
An evaluation of negative selection algorithm with constraint-based detectors
Proceedings of the 44th annual Southeast regional conference
Revisiting Negative Selection Algorithms
Evolutionary Computation
Application areas of AIS: The past, the present and the future
Applied Soft Computing
Review: The use of computational intelligence in intrusion detection systems: A review
Applied Soft Computing
The effect of binary matching rules in negative selection
GECCO'03 Proceedings of the 2003 international conference on Genetic and evolutionary computation: PartI
A computer security model of imitated nature immune and its FSM
LSMS'07 Proceedings of the Life system modeling and simulation 2007 international conference on Bio-Inspired computational intelligence and applications
A worm detection model based on artificial immunology
IITA'09 Proceedings of the 3rd international conference on Intelligent information technology application
A model of collaborative artificial immune system
CAR'10 Proceedings of the 2nd international Asia conference on Informatics in control, automation and robotics - Volume 3
Negative selection algorithms on strings with efficient training and linear-time classification
Theoretical Computer Science
Research of adaptive immune network intrusion detection model
International Journal of Systems, Control and Communications
On permutation masks in hamming negative selection
ICARIS'06 Proceedings of the 5th international conference on Artificial Immune Systems
Integrating innate and adaptive immunity for intrusion detection
ICARIS'06 Proceedings of the 5th international conference on Artificial Immune Systems
ICARIS'06 Proceedings of the 5th international conference on Artificial Immune Systems
Application areas of AIS: the past, the present and the future
ICARIS'05 Proceedings of the 4th international conference on Artificial Immune Systems
WCIS: a prototype for detecting zero-day attacks in web server requests
LISA'11 Proceedings of the 25th international conference on Large Installation System Administration
Multi-stage attack detection algorithm based on hidden markov model
WISM'12 Proceedings of the 2012 international conference on Web Information Systems and Mining
A comparative study of negative selection based anomaly detection in sequence data
ICARIS'12 Proceedings of the 11th international conference on Artificial Immune Systems
Hybrid negative selection approach for anomaly detection
CISIM'12 Proceedings of the 11th IFIP TC 8 international conference on Computer Information Systems and Industrial Management
Application of the feature-detection rule to the Negative Selection Algorithm
Expert Systems with Applications: An International Journal
Negative selection algorithm based on grid file of the feature space
Knowledge-Based Systems
Hi-index | 0.00 |