One-class texture classifier in the CCR feature space
Pattern Recognition Letters
Self-Nonself Discrimination in a Computer
SP '94 Proceedings of the 1994 IEEE Symposium on Security and Privacy
Anomaly Detection Using Real-Valued Negative Selection
Genetic Programming and Evolvable Machines
Estimating the detector coverage in a negative selection algorithm
GECCO '05 Proceedings of the 7th annual conference on Genetic and evolutionary computation
Is negative selection appropriate for anomaly detection?
GECCO '05 Proceedings of the 7th annual conference on Genetic and evolutionary computation
An evolutionary algorithm to generate hyper-ellipsoid detectors for negative selection
GECCO '05 Proceedings of the 7th annual conference on Genetic and evolutionary computation
How Do We Evaluate Artificial Immune Systems?
Evolutionary Computation
The effect of binary matching rules in negative selection
GECCO'03 Proceedings of the 2003 international conference on Genetic and evolutionary computation: PartI
Not all balls are round: an investigation of alternative recognition-region shapes
ICARIS'05 Proceedings of the 4th international conference on Artificial Immune Systems
A comparative study of real-valued negative selection to statistical anomaly detection techniques
ICARIS'05 Proceedings of the 4th international conference on Artificial Immune Systems
An immunity-based technique to characterize intrusions in computernetworks
IEEE Transactions on Evolutionary Computation
Revisiting Negative Selection Algorithms
Evolutionary Computation
Proceedings of the 9th annual conference on Genetic and evolutionary computation
Improving accuracy of immune-inspired malware detectors by using intelligent features
Proceedings of the 10th annual conference on Genetic and evolutionary computation
Further Exploration of the Dendritic Cell Algorithm: Antigen Multiplier and Time Windows
ICARIS '08 Proceedings of the 7th international conference on Artificial Immune Systems
V-detector: An efficient negative selection algorithm with "probably adequate" detector coverage
Information Sciences: an International Journal
ICARIS '09 Proceedings of the 8th International Conference on Artificial Immune Systems
Review: The use of computational intelligence in intrusion detection systems: A review
Applied Soft Computing
Feasibility of one-class-SVM for anomaly detection in telecommunication network
CIMMACS'07 Proceedings of the 6th WSEAS international conference on Computational intelligence, man-machine systems and cybernetics
Fault detection in analog circuits using a fuzzy dendritic cell algorithm
ICARIS'11 Proceedings of the 10th international conference on Artificial immune systems
A transitional view of immune inspired techniques for anomaly detection
IDEAL'12 Proceedings of the 13th international conference on Intelligent Data Engineering and Automated Learning
Real-Valued negative selection algorithm with variable-sized self radius
ICICA'12 Proceedings of the Third international conference on Information Computing and Applications
Hi-index | 0.00 |
The paper examines various applicability issues of the negative selection algorithms (NSA). Recently, concerns were raised on the use of NSAs, especially those using real-valued representation. In this paper, we argued that many reported issues are either due to improper usage of the method or general difficulties which are not specific to negative selection algorithms. On the contrary, the experiments with synthetic data and well-known real-world data show that NSAs have great flexibility to balance between efficiency and robustness, and to accommodate domain-oriented elements in the method, e.g. various distance measures. It is to be noted that all methods are not suitable for all datasets and data representation plays a major role.