Communications of the ACM
Deriving a concise description of non-self patterns in an aritificial immune system
New learning paradigms in soft computing
Anomaly Detection in Embedded Systems
IEEE Transactions on Computers - Special issue on fault-tolerant embedded systems
Mimicry attacks on host-based intrusion detection systems
Proceedings of the 9th ACM conference on Computer and communications security
Immunotronics: Hardware Fault Tolerance Inspired by the Immune System
ICES '00 Proceedings of the Third International Conference on Evolvable Systems: From Biology to Hardware
ICES '01 Proceedings of the 4th International Conference on Evolvable Systems: From Biology to Hardware
Intrusion Detection Using Variable-Length Audit Trail Patterns
RAID '00 Proceedings of the Third International Workshop on Recent Advances in Intrusion Detection
An Immunological Approach to Combinatorial Optimization Problems
IBERAMIA 2002 Proceedings of the 8th Ibero-American Conference on AI: Advances in Artificial Intelligence
NIDS Research Based on Artificial Immunology
ICICS '01 Proceedings of the Third International Conference on Information and Communications Security
An Immunological Approach to Change Detection: Theoretical Results
CSFW '96 Proceedings of the 9th IEEE workshop on Computer Security Foundations
An immunogenetic approach in chemical spectrum recognition
Advances in evolutionary computing
Genetic Programming and Evolvable Machines
A Hardware Artificial Immune System and Embryonic Array for Fault Tolerant Systems
Genetic Programming and Evolvable Machines
Using a threshold function to determine the status of lymphocytes in the artificial immune system
SAICSIT '03 Proceedings of the 2003 annual research conference of the South African institute of computer scientists and information technologists on Enablement through technology
Fast multipattern search algorithms for intrusion detection
Fundamenta Informaticae - Special issue on computing patterns in strings
Novelty detection: a review—part 1: statistical approaches
Signal Processing
Artificial Immune Recognition System (AIRS): An Immune-Inspired Supervised Learning Algorithm
Genetic Programming and Evolvable Machines
Resilient and adaptive defense of computing networks
Complexity - Special issue: Resilient and adaptive defense of computing networks
Complexity - Special issue: Resilient and adaptive defense of computing networks
An artificial immune based intrusion detection model for computer and telecommunication systems
Parallel Computing - Special issue: Parallel and nature-inspired computational paradigms and applications
A new approach to solve hybrid flow shop scheduling problems by artificial immune system
Future Generation Computer Systems - Special issue: Computational science of lattice Boltzmann modelling
Hybrid detector set: detectors with different affinity
InfoSecu '04 Proceedings of the 3rd international conference on Information security
Securing ad hoc networks through mobile agent
InfoSecu '04 Proceedings of the 3rd international conference on Information security
A framework of cooperating intrusion detection based on clustering analysis and expert system
InfoSecu '04 Proceedings of the 3rd international conference on Information security
LAD: Localization Anomaly Detection forWireless Sensor Networks
IPDPS '05 Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05) - Papers - Volume 01
The T-detectors maturation algorithm based on match range model
Proceedings of the 2005 ACM symposium on Applied computing
Proceedings of the 2005 ACM symposium on Applied computing
Estimating the detector coverage in a negative selection algorithm
GECCO '05 Proceedings of the 7th annual conference on Genetic and evolutionary computation
Discriminating and visualizing anomalies using negative selection and self-organizing maps
GECCO '05 Proceedings of the 7th annual conference on Genetic and evolutionary computation
Is negative selection appropriate for anomaly detection?
GECCO '05 Proceedings of the 7th annual conference on Genetic and evolutionary computation
The application of antigenic search techniques to time series forecasting
GECCO '05 Proceedings of the 7th annual conference on Genetic and evolutionary computation
An innate immune system for the protection of computer networks
WISICT '05 Proceedings of the 4th international symposium on Information and communication technologies
Architecture for an Artificial Immune System
Evolutionary Computation
How Do We Evaluate Artificial Immune Systems?
Evolutionary Computation
A Machine Learning Evaluation of an Artificial Immune System
Evolutionary Computation
A Novel Fuzzy Anomaly Detection Algorithm Based on Artificial Immune System
HPCASIA '05 Proceedings of the Eighth International Conference on High-Performance Computing in Asia-Pacific Region
Applicability issues of the real-valued negative selection algorithms
Proceedings of the 8th annual conference on Genetic and evolutionary computation
Immune anomaly detection enhanced with evolutionary paradigms
Proceedings of the 8th annual conference on Genetic and evolutionary computation
An evaluation of negative selection algorithm with constraint-based detectors
Proceedings of the 44th annual Southeast regional conference
Analyzing and evaluating dynamics in stide performance for intrusion detection
Knowledge-Based Systems
Learning DFA representations of HTTP for protecting web applications
Computer Networks: The International Journal of Computer and Telecommunications Networking
WitMeMo '06 Proceedings of the second international workshop on Wireless traffic measurements and modeling
Copilot - a coprocessor-based kernel runtime integrity monitor
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
Revisiting Negative Selection Algorithms
Evolutionary Computation
An artificial immune system with partially specified antibodies
Proceedings of the 9th annual conference on Genetic and evolutionary computation
Application areas of AIS: The past, the present and the future
Applied Soft Computing
A hardware/software partitioning algorithm based on artificial immune principles
Applied Soft Computing
Immune system based distributed node and rate selection in wireless sensor networks
Proceedings of the 1st international conference on Bio inspired models of network, information and computing systems
Information Security Tech. Report
Information Security Tech. Report
Multi-class iteratively refined negative selection classifier
Applied Soft Computing
Monitoring smartphones for anomaly detection
Proceedings of the 1st international conference on MOBILe Wireless MiddleWARE, Operating Systems, and Applications
Integrated platform of artificial immune system for anomaly detection
AIKED'05 Proceedings of the 4th WSEAS International Conference on Artificial Intelligence, Knowledge Engineering Data Bases
Self and non-self discrimination agents
Proceedings of the 2008 ACM symposium on Applied computing
Immunological inspiration for building a new generation of autonomic systems
Proceedings of the 1st international conference on Autonomic computing and communication systems
A hybrid artificial immune system and Self Organising Map for network intrusion detection
Information Sciences: an International Journal
Improving accuracy of immune-inspired malware detectors by using intelligent features
Proceedings of the 10th annual conference on Genetic and evolutionary computation
Discriminating self from non-self with finite mixtures of multivariate Bernoulli distributions
Proceedings of the 10th annual conference on Genetic and evolutionary computation
International Journal of Remote Sensing
Theoretical advances in artificial immune systems
Theoretical Computer Science
Application-level simulation for network security
Proceedings of the 1st international conference on Simulation tools and techniques for communications, networks and systems & workshops
Immune-Inspired Online Method for Service Interactions Detection
SOFSEM '07 Proceedings of the 33rd conference on Current Trends in Theory and Practice of Computer Science
Research on Bio-inspired Multi-net Paralleling Mechanism Based on Web Application
ICCS '07 Proceedings of the 7th international conference on Computational Science, Part III: ICCS 2007
Network Anomaly Detection Based on DSOM and ACO Clustering
ISNN '07 Proceedings of the 4th international symposium on Neural Networks: Part II--Advances in Neural Networks
Artificial Immune System Based Robot Anomaly Detection Engine for Fault Tolerant Robots
ATC '08 Proceedings of the 5th international conference on Autonomic and Trusted Computing
Social Layers in Agents' Behavior Evaluation System
ICCS '08 Proceedings of the 8th international conference on Computational Science, Part III
Negative Selection with Antigen Feedback in Intrusion Detection
ICARIS '08 Proceedings of the 7th international conference on Artificial Immune Systems
An Empirical Study of Self/Non-self Discrimination in Binary Data with a Kernel Estimator
ICARIS '08 Proceedings of the 7th international conference on Artificial Immune Systems
A Novel Immune Based Approach for Detection of Windows PE Virus
ADMA '08 Proceedings of the 4th international conference on Advanced Data Mining and Applications
Hardware Acceleration of an Immune Network Inspired Evolutionary Algorithm for Medical Diagnosis
ICES '08 Proceedings of the 8th international conference on Evolvable Systems: From Biology to Hardware
Study of Immune Control Computing in Immune Detection Algorithm for Information Security
ICIC '08 Proceedings of the 4th international conference on Intelligent Computing: Advanced Intelligent Computing Theories and Applications - with Aspects of Artificial Intelligence
A hybrid intelligent system for fault detection and sensor fusion
Applied Soft Computing
A negative selection algorithm for classification and reduction of the noise effect
Applied Soft Computing
T-detector maturation algorithm with overlap rate
WSEAS Transactions on Computers
Distributed agents model for intrusion detection based on AIS
Knowledge-Based Systems
Monitoring smartphones for anomaly detection
Mobile Networks and Applications
Improving network intrusion detection through soft computing and natural immunology
ACS'08 Proceedings of the 8th conference on Applied computer scince
A Novel Biology-Inspired Virus Detection Model with RVNS
ISICA '08 Proceedings of the 3rd International Symposium on Advances in Computation and Intelligence
WSEAS Transactions on Information Science and Applications
Agent-based modeling of host-pathogen systems: The successes and challenges
Information Sciences: an International Journal
V-detector: An efficient negative selection algorithm with "probably adequate" detector coverage
Information Sciences: an International Journal
Automatic knot adjustment using an artificial immune system for B-spline curve approximation
Information Sciences: an International Journal
An Expanded Lateral Interactive Clonal Selection Algorithm and Its Application
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Soft Computing Techniques for Internet Backbone Traffic Anomaly Detection
EvoWorkshops '09 Proceedings of the EvoWorkshops 2009 on Applications of Evolutionary Computing: EvoCOMNET, EvoENVIRONMENT, EvoFIN, EvoGAMES, EvoHOT, EvoIASP, EvoINTERACTION, EvoMUSART, EvoNUM, EvoSTOC, EvoTRANSLOG
ACM Computing Surveys (CSUR)
Large-scale optimization using immune algorithm
Proceedings of the first ACM/SIGEVO Summit on Genetic and Evolutionary Computation
Face recognition using immune network based on principal component analysis
Proceedings of the first ACM/SIGEVO Summit on Genetic and Evolutionary Computation
On average time complexity of evolutionary negative selection algorithms for anomaly detection
Proceedings of the first ACM/SIGEVO Summit on Genetic and Evolutionary Computation
Selecting and Improving System Call Models for Anomaly Detection
DIMVA '09 Proceedings of the 6th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment
The future of biologically-inspired security: is there anything left to learn?
NSPW '07 Proceedings of the 2007 Workshop on New Security Paradigms
Foundations of r-contiguous matching in negative selection for anomaly detection
Natural Computing: an international journal
Efficient Algorithms for String-Based Negative Selection
ICARIS '09 Proceedings of the 8th International Conference on Artificial Immune Systems
Biologically inspired defenses against computer viruses
IJCAI'95 Proceedings of the 14th international joint conference on Artificial intelligence - Volume 1
Artificial immune system based intrusion detection system
Proceedings of the 2nd international conference on Security of information and networks
An artificial immune system based sensor network for frost warning and prevention
SpringSim '09 Proceedings of the 2009 Spring Simulation Multiconference
Review: The use of computational intelligence in intrusion detection systems: A review
Applied Soft Computing
Journal of Artificial Evolution and Applications - Special issue on artificial evolution methods in the biological and biomedical sciences
Associative classification with artificial immune system
IEEE Transactions on Evolutionary Computation
IEEE Transactions on Information Technology in Biomedicine - Special section on computational intelligence in medical systems
Watermarking schema using an artificial immune system in spatial domain
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human
Evolutionary techniques in a constraint satisfaction problem: puzzle eternity II
CEC'09 Proceedings of the Eleventh conference on Congress on Evolutionary Computation
Storage-Based Intrusion Detection Using Artificial Immune Technique
ISICA '09 Proceedings of the 4th International Symposium on Advances in Computation and Intelligence
Optimization of Real-Valued Self Set for Anomaly Detection Using Gaussian Distribution
AICI '09 Proceedings of the International Conference on Artificial Intelligence and Computational Intelligence
Process Mining and Security: Detecting Anomalous Process Executions and Checking Process Conformance
Electronic Notes in Theoretical Computer Science (ENTCS)
Information Sciences: an International Journal
Research on linear time detector generating algorithm based on negative selection model
CCDC'09 Proceedings of the 21st annual international conference on Chinese control and decision conference
Baldwinian learning in clonal selection algorithm for optimization
Information Sciences: an International Journal
Vaccine-enhanced artificial immune system for multimodal function optimization
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics
Dynamical immunological surveillance for network danger evaluation model
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
Hybrid detector based negative selection algorithm
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
A taxonomy of biologically inspired research in computer networking
Computer Networks: The International Journal of Computer and Telecommunications Networking
Design of an Artificial Immune System for fault detection: A Negative Selection Approach
Expert Systems with Applications: An International Journal
Design of an artificial immune system based on Danger Model for fault detection
Expert Systems with Applications: An International Journal
Expert Systems with Applications: An International Journal
MILA: multilevel immune learning algorithm
GECCO'03 Proceedings of the 2003 international conference on Genetic and evolutionary computation: PartI
The effect of binary matching rules in negative selection
GECCO'03 Proceedings of the 2003 international conference on Genetic and evolutionary computation: PartI
A scalable artificial immune system model for dynamic unsupervised learning
GECCO'03 Proceedings of the 2003 international conference on Genetic and evolutionary computation: PartI
Design and implementation of security system based on immune system
ISSS'02 Proceedings of the 2002 Mext-NSF-JSPS international conference on Software security: theories and systems
Ontogenetic development and fault tolerance in the POEtic tissue
ICES'03 Proceedings of the 5th international conference on Evolvable systems: from biology to hardware
A learning, multi-layered, hardware artificial immune system implemented upon an embryonic array
ICES'03 Proceedings of the 5th international conference on Evolvable systems: from biology to hardware
Novel immune-based framework for securing ad hoc networks
Proceedings of the 2010 ACM Symposium on Applied Computing
MICAI'07 Proceedings of the artificial intelligence 6th Mexican international conference on Advances in artificial intelligence
A novel immune inspired approach to fault detection
ICARIS'07 Proceedings of the 6th international conference on Artificial immune systems
Bankruptcy prediction using artificial immune systems
ICARIS'07 Proceedings of the 6th international conference on Artificial immune systems
Phase transition and the computational complexity of generating r-contiguous detectors
ICARIS'07 Proceedings of the 6th international conference on Artificial immune systems
Real-valued negative selection algorithm with a Quasi-Monte Carlo genetic detector generation
ICARIS'07 Proceedings of the 6th international conference on Artificial immune systems
A novel fast negative selection algorithm enhanced by state graphs
ICARIS'07 Proceedings of the 6th international conference on Artificial immune systems
An artificial immune system based approach for English grammar checking
ICARIS'07 Proceedings of the 6th international conference on Artificial immune systems
A computer security model of imitated nature immune and its FSM
LSMS'07 Proceedings of the Life system modeling and simulation 2007 international conference on Bio-Inspired computational intelligence and applications
A sandbox with a dynamic policy based on execution contexts of applications
ASIAN'07 Proceedings of the 12th Asian computing science conference on Advances in computer science: computer and network security
Decentralized detector generation in cooperative intrusion detection systems
SSS'07 Proceedings of the 9h international conference on Stabilization, safety, and security of distributed systems
A new intrusion detection method based on antibody concentration
ICIC'09 Proceedings of the Intelligent computing 5th international conference on Emerging intelligent computing technology and applications
A worm detection model based on artificial immunology
IITA'09 Proceedings of the 3rd international conference on Intelligent information technology application
A generative model for self/non-self discrimination in strings
ICANNGA'09 Proceedings of the 9th international conference on Adaptive and natural computing algorithms
A Survey of artificial immune applications
Artificial Intelligence Review
Negative selection algorithms without generating detectors
Proceedings of the 12th annual conference on Genetic and evolutionary computation
Evolutionary artificial immune system optimization
Proceedings of the 12th annual conference companion on Genetic and evolutionary computation
A review of evolutionary and immune-inspired information filtering
Natural Computing: an international journal
An immunological approach for file recovery over JXTA peer-to-peer framework
International Journal of Network Management
Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research
Immune model based approach for network intrusion detection
Proceedings of the 3rd international conference on Security of information and networks
A cooperative immunological approach for detecting network anomaly
Applied Soft Computing
Artificial immune classifier with swarm learning
Engineering Applications of Artificial Intelligence
Evolving boundary detector for anomaly detection
Expert Systems with Applications: An International Journal
Discrete wavelet transform-based time series analysis and mining
ACM Computing Surveys (CSUR)
Immunity-based model for malicious code detection
ICIC'10 Proceedings of the 6th international conference on Advanced intelligent computing theories and applications: intelligent computing
A nonself space approach to network anomaly detection
IPDPS'06 Proceedings of the 20th international conference on Parallel and distributed processing
An immune memory clonal algorithm for numerical and combinatorial optimization
Frontiers of Computer Science in China
Sequence diagram to colored Petri nets transformation testing: an immune system metaphor
Proceedings of the 2010 Conference of the Center for Advanced Studies on Collaborative Research
Collaborative RFID intrusion detection with an artificial immune system
Journal of Intelligent Information Systems
Negative selection algorithms on strings with efficient training and linear-time classification
Theoretical Computer Science
PCA based immune networks for human face recognition
Applied Soft Computing
Real-valued negative selection (RNS) for classification task
ICPR'10 Proceedings of the 20th International conference on Recognizing patterns in signals, speech, images, and videos
An intraday trading model based on Artificial Immune Systems
Proceedings of the 2011 conference on Neural Nets WIRN10: Proceedings of the 20th Italian Workshop on Neural Nets
An immunological approach to change detection: algorithms, analysis and implications
SP'96 Proceedings of the 1996 IEEE conference on Security and privacy
A sense of self for Unix processes
SP'96 Proceedings of the 1996 IEEE conference on Security and privacy
Towards efficient and effective negative selection algorithm: a convex hull representation scheme
SEAL'10 Proceedings of the 8th international conference on Simulated evolution and learning
Priming: making the reaction to intrusion or fault predictable
Natural Computing: an international journal
Example-based model-transformation testing
Automated Software Engineering
From biological and social network metaphors to coupled bio-social wireless networks
International Journal of Autonomous and Adaptive Communications Systems
Preemptive performance monitoring of a large network of Wi-Fi hotspots: an artificial immune system
WWIC'11 Proceedings of the 9th IFIP TC 6 international conference on Wired/wireless internet communications
Relevance of pattern recognition in a non-deterministic model of immune responses
ICARIS'11 Proceedings of the 10th international conference on Artificial immune systems
Fault detection in analog circuits using a fuzzy dendritic cell algorithm
ICARIS'11 Proceedings of the 10th international conference on Artificial immune systems
Clonal selection algorithm for classification
ICARIS'11 Proceedings of the 10th international conference on Artificial immune systems
Hybridization of immunological computation and fuzzy systems in surgery decision making
KES'11 Proceedings of the 15th international conference on Knowledge-based and intelligent information and engineering systems - Volume Part IV
A distributed surveillance model for network security inspired by immunology
AICI'11 Proceedings of the Third international conference on Artificial intelligence and computational intelligence - Volume Part II
Run-time malware detection based on positive selection
Journal in Computer Virology
A new detector set generating algorithm in the negative selection model
ICNC'05 Proceedings of the First international conference on Advances in Natural Computation - Volume Part II
A new model of immune-based network surveillance and dynamic computer forensics
ICNC'05 Proceedings of the First international conference on Advances in Natural Computation - Volume Part II
Algorithms of non-self detector by negative selection principle in artificial immune system
ICNC'05 Proceedings of the First international conference on Advances in Natural Computation - Volume Part II
A novel negative selection algorithm with an array of partial matching lengths for each detector
PPSN'06 Proceedings of the 9th international conference on Parallel Problem Solving from Nature
PPSN'06 Proceedings of the 9th international conference on Parallel Problem Solving from Nature
Behavior evaluation with actions' sampling in multi-agent system
CEEMAS'05 Proceedings of the 4th international Central and Eastern European conference on Multi-Agent Systems and Applications
An artificial immune classifier for credit scoring analysis
Applied Soft Computing
On permutation masks in hamming negative selection
ICARIS'06 Proceedings of the 5th international conference on Artificial Immune Systems
A comparative study on self-tolerant strategies for hardware immune systems
ICARIS'06 Proceedings of the 5th international conference on Artificial Immune Systems
ICARIS'06 Proceedings of the 5th international conference on Artificial Immune Systems
A population adaptive based immune algorithm for solving multi-objective optimization problems
ICARIS'06 Proceedings of the 5th international conference on Artificial Immune Systems
Theoretical basis of novelty detection in time series using negative selection algorithms
ICARIS'06 Proceedings of the 5th international conference on Artificial Immune Systems
Innate and adaptive principles for an artificial immune system
SEAL'06 Proceedings of the 6th international conference on Simulated Evolution And Learning
Immune-Based dynamic intrusion response model
SEAL'06 Proceedings of the 6th international conference on Simulated Evolution And Learning
Immune multi-agent active defense model for network intrusion
SEAL'06 Proceedings of the 6th international conference on Simulated Evolution And Learning
Profiling network attacks via AIS
WIRN'05 Proceedings of the 16th Italian conference on Neural Nets
On diversity and artificial immune systems: incorporating a diversity operator into ainet
WIRN'05 Proceedings of the 16th Italian conference on Neural Nets
Challenges for artificial immune systems
WIRN'05 Proceedings of the 16th Italian conference on Neural Nets
Dynamic negative selection algorithm based on match range model
AI'05 Proceedings of the 18th Australian Joint conference on Advances in Artificial Intelligence
A cytokine formal immune network
ECAL'05 Proceedings of the 8th European conference on Advances in Artificial Life
Multiple-Point bit mutation method of detector generation for SNSD model
ISNN'06 Proceedings of the Third international conference on Advances in Neural Networks - Volume Part III
Heterogeneous behavior evaluations in ethically–social approach to security in multi-agent system
ICCS'06 Proceedings of the 6th international conference on Computational Science - Volume Part III
Static clonal selection algorithm based on match range model
IEA/AIE'06 Proceedings of the 19th international conference on Advances in Applied Artificial Intelligence: industrial, Engineering and Other Applications of Applied Intelligent Systems
An immune-based model for computer virus detection
CANS'05 Proceedings of the 4th international conference on Cryptology and Network Security
A new model for dynamic intrusion detection
CANS'05 Proceedings of the 4th international conference on Cryptology and Network Security
A new bio-inspired model for network security and its application
APWeb'06 Proceedings of the 2006 international conference on Advanced Web and Network Technologies, and Applications
ORCA – towards an organic robotic control architecture
IWSOS'06/EuroNGI'06 Proceedings of the First international conference, and Proceedings of the Third international conference on New Trends in Network Architectures and Services conference on Self-Organising Systems
A new immunotronic approach to hardware fault detection using symbiotic evolution
IWINAC'05 Proceedings of the First international work-conference on the Interplay Between Natural and Artificial Computation conference on Artificial Intelligence and Knowledge Engineering Applications: a bioinspired approach - Volume Part II
The t-detectors maturation algorithm based on genetic algorithm
AI'04 Proceedings of the 17th Australian joint conference on Advances in Artificial Intelligence
Adaptive hybrid immune detector maturation algorithm
HAIS'10 Proceedings of the 5th international conference on Hybrid Artificial Intelligence Systems - Volume Part II
Intrusion detection based on dynamic self-organizing map neural network clustering
ISNN'05 Proceedings of the Second international conference on Advances in Neural Networks - Volume Part III
What have gene libraries done for AIS?
ICARIS'05 Proceedings of the 4th international conference on Artificial Immune Systems
Inspiration for the next generation of artificial immune systems
ICARIS'05 Proceedings of the 4th international conference on Artificial Immune Systems
A comparative study of real-valued negative selection to statistical anomaly detection techniques
ICARIS'05 Proceedings of the 4th international conference on Artificial Immune Systems
Self-regulating method for model library based artificial immune systems
ICARIS'05 Proceedings of the 4th international conference on Artificial Immune Systems
Application areas of AIS: the past, the present and the future
ICARIS'05 Proceedings of the 4th international conference on Artificial Immune Systems
A formal immune network and its implementation for on-line intrusion detection
MMM-ACNS'05 Proceedings of the Third international conference on Mathematical Methods, Models, and Architectures for Computer Network Security
An adaptive self-tolerant algorithm for hardware immune system
ICES'05 Proceedings of the 6th international conference on Evolvable Systems: from Biology to Hardware
The conflict between self-* capabilities and predictability
Self-star Properties in Complex Information Systems
Network anomaly behavior detection using an adaptive multiplex detector
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part III
WISE'06 Proceedings of the 7th international conference on Web Information Systems
A study of nature-inspired methods for financial trend reversal detection
EvoCOMNET'10 Proceedings of the 2010 international conference on Applications of Evolutionary Computation - Volume Part II
A trojan detector generating algorithm based on chaotic theory
ICIC'11 Proceedings of the 7th international conference on Advanced Intelligent Computing
WCIS: a prototype for detecting zero-day attacks in web server requests
LISA'11 Proceedings of the 25th international conference on Large Installation System Administration
Artificial Immune Systems: Models, Applications, and challenges
Proceedings of the 27th Annual ACM Symposium on Applied Computing
International Journal of Information Management: The Journal for Information Professionals
Shadow attacks: automatically evading system-call-behavior based malware detection
Journal in Computer Virology
Alert correlation using artificial immune recognition system
International Journal of Bio-Inspired Computation
Expert Systems with Applications: An International Journal
An artificial immune system approach to associative classification
ICCSA'12 Proceedings of the 12th international conference on Computational Science and Its Applications - Volume Part I
A malware detection system inspired on the human immune system
ICCSA'12 Proceedings of the 12th international conference on Computational Science and Its Applications - Volume Part IV
MLDM'12 Proceedings of the 8th international conference on Machine Learning and Data Mining in Pattern Recognition
A danger feature based negative selection algorithm
ICSI'12 Proceedings of the Third international conference on Advances in Swarm Intelligence - Volume Part I
A transitional view of immune inspired techniques for anomaly detection
IDEAL'12 Proceedings of the 13th international conference on Intelligent Data Engineering and Automated Learning
Journal of Intelligent Manufacturing
Real-Valued negative selection algorithm with variable-sized self radius
ICICA'12 Proceedings of the Third international conference on Information Computing and Applications
A comparative study of negative selection based anomaly detection in sequence data
ICARIS'12 Proceedings of the 11th international conference on Artificial Immune Systems
AC-CS: an immune-inspired associative classification algorithm
ICARIS'12 Proceedings of the 11th international conference on Artificial Immune Systems
A negative selection approach to intrusion detection
ICARIS'12 Proceedings of the 11th international conference on Artificial Immune Systems
ICARIS'12 Proceedings of the 11th international conference on Artificial Immune Systems
An ecological approach to anomaly detection: the EIA model
ICARIS'12 Proceedings of the 11th international conference on Artificial Immune Systems
Hybrid negative selection approach for anomaly detection
CISIM'12 Proceedings of the 11th IFIP TC 8 international conference on Computer Information Systems and Industrial Management
Efficient negative selection algorithms by sampling and approximate counting
PPSN'12 Proceedings of the 12th international conference on Parallel Problem Solving from Nature - Volume Part I
Immune algorithm for bitmap join indexes
ICONIP'12 Proceedings of the 19th international conference on Neural Information Processing - Volume Part III
Artificial immune systems for optimisation
Proceedings of the 15th annual conference companion on Genetic and evolutionary computation
Design of a parallel immune algorithm based on the germinal center reaction
Proceedings of the 15th annual conference companion on Genetic and evolutionary computation
A survey on optimization metaheuristics
Information Sciences: an International Journal
Robotics and Computer-Integrated Manufacturing
Negative selection algorithm based on grid file of the feature space
Knowledge-Based Systems
Review: A review of novelty detection
Signal Processing
Hi-index | 0.02 |
The problem of protecting computer systems can be viewed generally as the problem of learning to distinguish self from other. We describe a method for change detection which is based on the generation of T cells in the immune system. Mathematical analysis reveals computational costs of the system, and preliminary experiments illustrate how the method might be applied to the problem of computer viruses.