Induction: processes of inference, learning, and discovery
Induction: processes of inference, learning, and discovery
Learning internal representations by error propagation
Parallel distributed processing: explorations in the microstructure of cognition, vol. 1
Experience with a learning personal assistant
Communications of the ACM
Tracking Drifting Concepts By Minimizing Disagreements
Machine Learning - Special issue on computational learning theory
A survey of connectionist network reuse through transfer
Learning to learn
Towards a taxonomy of intrusion-detection systems
Computer Networks: The International Journal of Computer and Telecommunications Networking - Special issue on computer network security
The base-rate fallacy and the difficulty of intrusion detection
ACM Transactions on Information and System Security (TISSEC)
Machine Learning
Statistical Foundations of Audit Trail Analysis for the Detection of Computer Misuse
IEEE Transactions on Software Engineering
Detecting Concept Drift with Support Vector Machines
ICML '00 Proceedings of the Seventeenth International Conference on Machine Learning
CDIS: Towards a Computer Immune System for Detecting Network Intrusions
RAID '00 Proceedings of the 4th International Symposium on Recent Advances in Intrusion Detection
Coverage and Generalization in an Artificial Immune System
GECCO '02 Proceedings of the Genetic and Evolutionary Computation Conference
ILP '96 Selected Papers from the 6th International Workshop on Inductive Logic Programming
The Architecture For A Hardware Immune System
EH '01 Proceedings of the The 3rd NASA/DoD Workshop on Evolvable Hardware
Self-Nonself Discrimination in a Computer
SP '94 Proceedings of the 1994 IEEE Symposium on Security and Privacy
Evaluation of Intrusion Detectors: A Decision Theory Approach
SP '01 Proceedings of the 2001 IEEE Symposium on Security and Privacy
An immunological model of distributed detection and its application to computer security
An immunological model of distributed detection and its application to computer security
Machine learning techniques for the computer security domain of anomaly detection
Machine learning techniques for the computer security domain of anomaly detection
Architecture for an Artificial Immune System
Evolutionary Computation
Revisiting LISYS: parameters and normal behavior
CEC '02 Proceedings of the Evolutionary Computation on 2002. CEC '02. Proceedings of the 2002 Congress - Volume 02
An immunity-based technique to characterize intrusions in computernetworks
IEEE Transactions on Evolutionary Computation
A formal framework for positive and negative detection schemes
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics
Immune anomaly detection enhanced with evolutionary paradigms
Proceedings of the 8th annual conference on Genetic and evolutionary computation
Selection for group-level efficiency leads to self-regulation of population size
Proceedings of the 10th annual conference on Genetic and evolutionary computation
Monitoring smartphones for anomaly detection
Mobile Networks and Applications
Adaptive Behavior - Animals, Animats, Software Agents, Robots, Adaptive Systems
Foundations of r-contiguous matching in negative selection for anomaly detection
Natural Computing: an international journal
Review: The use of computational intelligence in intrusion detection systems: A review
Applied Soft Computing
A worm detection model based on artificial immunology
IITA'09 Proceedings of the 3rd international conference on Intelligent information technology application
An immunological approach for file recovery over JXTA peer-to-peer framework
International Journal of Network Management
A new distributed intrusion detection method based on immune mobile agent
LSMS/ICSEE'10 Proceedings of the 2010 international conference on Life system modeling and and intelligent computing, and 2010 international conference on Intelligent computing for sustainable energy and environment: Part I
Artificial Intelligence Review
An ecological approach to anomaly detection: the EIA model
ICARIS'12 Proceedings of the 11th international conference on Artificial Immune Systems
Hi-index | 0.00 |
ARTIS is an artificial immune system framework which contains several adaptive mechanisms. LISYS is a version of ARTIS specialized for the problem of network intrusion detection. The adaptive mechanisms of LISYS are characterized in terms of their machine-learning counterparts, and a series of experiments is described, each of which isolates a different mechanism of LISYS and studies its contribution to the system's overall performance. The experiments were conducted on a new data set, which is more recent and realistic than earlier data sets. The network intrusion detection problem is challenging because it requires one-class learning in an on-line setting with concept drift. The experiments confirm earlier experimental results with LISYS, and they study in detail how LISYS achieves success on the new data set.