Coverage and Generalization in an Artificial Immune System
GECCO '02 Proceedings of the Genetic and Evolutionary Computation Conference
On The Use Of Negative Selection In An Artificial Immune System
GECCO '02 Proceedings of the Genetic and Evolutionary Computation Conference
An Immunological Approach to Change Detection: Theoretical Results
CSFW '96 Proceedings of the 9th IEEE workshop on Computer Security Foundations
Self-Nonself Discrimination in a Computer
SP '94 Proceedings of the 1994 IEEE Symposium on Security and Privacy
An Immunological Approach to Change Detection: Algorithms, Analysis and Implications
SP '96 Proceedings of the 1996 IEEE Symposium on Security and Privacy
An immunological model of distributed detection and its application to computer security
An immunological model of distributed detection and its application to computer security
Anomaly Detection Using Real-Valued Negative Selection
Genetic Programming and Evolvable Machines
Estimating the detector coverage in a negative selection algorithm
GECCO '05 Proceedings of the 7th annual conference on Genetic and evolutionary computation
Discriminating and visualizing anomalies using negative selection and self-organizing maps
GECCO '05 Proceedings of the 7th annual conference on Genetic and evolutionary computation
Is negative selection appropriate for anomaly detection?
GECCO '05 Proceedings of the 7th annual conference on Genetic and evolutionary computation
An evolutionary algorithm to generate hyper-ellipsoid detectors for negative selection
GECCO '05 Proceedings of the 7th annual conference on Genetic and evolutionary computation
Applying both positive and negative selection to supervised learning for anomaly detection
GECCO '05 Proceedings of the 7th annual conference on Genetic and evolutionary computation
Architecture for an Artificial Immune System
Evolutionary Computation
How Do We Evaluate Artificial Immune Systems?
Evolutionary Computation
Applicability issues of the real-valued negative selection algorithms
Proceedings of the 8th annual conference on Genetic and evolutionary computation
MILA: multilevel immune learning algorithm
GECCO'03 Proceedings of the 2003 international conference on Genetic and evolutionary computation: PartI
The effect of binary matching rules in negative selection
GECCO'03 Proceedings of the 2003 international conference on Genetic and evolutionary computation: PartI
On permutation masks in hamming negative selection
ICARIS'06 Proceedings of the 5th international conference on Artificial Immune Systems
ICARIS'06 Proceedings of the 5th international conference on Artificial Immune Systems
Not all balls are round: an investigation of alternative recognition-region shapes
ICARIS'05 Proceedings of the 4th international conference on Artificial Immune Systems
A comparative study of real-valued negative selection to statistical anomaly detection techniques
ICARIS'05 Proceedings of the 4th international conference on Artificial Immune Systems
An artificial immune system architecture for computer securityapplications
IEEE Transactions on Evolutionary Computation
An immunity-based technique to characterize intrusions in computernetworks
IEEE Transactions on Evolutionary Computation
A formal framework for positive and negative detection schemes
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics
Multiobjective immune algorithm with nondominated neighbor-based selection
Evolutionary Computation
Negative Selection with Antigen Feedback in Intrusion Detection
ICARIS '08 Proceedings of the 7th international conference on Artificial Immune Systems
A negative selection algorithm for classification and reduction of the noise effect
Applied Soft Computing
T-detector maturation algorithm with overlap rate
WSEAS Transactions on Computers
Detection of artery section area using artificial immune system algorithm
CSECS'08 Proceedings of the 7th conference on Circuits, systems, electronics, control and signal processing
Nonself Detection in a Two-Component Cellular Frustrated System
ICARIS '09 Proceedings of the 8th International Conference on Artificial Immune Systems
Review: The use of computational intelligence in intrusion detection systems: A review
Applied Soft Computing
Hybrid immune algorithm with intelligent recombination
CEC'09 Proceedings of the Eleventh conference on Congress on Evolutionary Computation
Negative selection algorithms without generating detectors
Proceedings of the 12th annual conference on Genetic and evolutionary computation
Evolving boundary detector for anomaly detection
Expert Systems with Applications: An International Journal
Using computational intelligence to identify performance bottlenecks in a computer system
PPSN'10 Proceedings of the 11th international conference on Parallel problem solving from nature: Part I
Negative selection algorithms on strings with efficient training and linear-time classification
Theoretical Computer Science
Review Article: Recent Advances in Artificial Immune Systems: Models and Applications
Applied Soft Computing
Towards efficient and effective negative selection algorithm: a convex hull representation scheme
SEAL'10 Proceedings of the 8th international conference on Simulated evolution and learning
Adaptive hybrid immune detector maturation algorithm
HAIS'10 Proceedings of the 5th international conference on Hybrid Artificial Intelligence Systems - Volume Part II
An artificial immune system approach to associative classification
ICCSA'12 Proceedings of the 12th international conference on Computational Science and Its Applications - Volume Part I
A transitional view of immune inspired techniques for anomaly detection
IDEAL'12 Proceedings of the 13th international conference on Intelligent Data Engineering and Automated Learning
AC-CS: an immune-inspired associative classification algorithm
ICARIS'12 Proceedings of the 11th international conference on Artificial Immune Systems
A negative selection approach to intrusion detection
ICARIS'12 Proceedings of the 11th international conference on Artificial Immune Systems
Hybrid negative selection approach for anomaly detection
CISIM'12 Proceedings of the 11th IFIP TC 8 international conference on Computer Information Systems and Industrial Management
A survey on optimization metaheuristics
Information Sciences: an International Journal
Hi-index | 0.00 |
This paper reviews the progress of negative selection algorithms, an anomaly/change detection approach in Artificial Immune Systems (AIS). Following its initial model, we try to identify the fundamental characteristics of this family of algorithms and summarize their diversities. There exist various elements in this method, including data representation, coverage estimate, affinity measure, and matching rules, which are discussed for different variations. The various negative selection algorithms are categorized by different criteria as well. The relationship and possible combinations with other AIS or other machine learning methods are discussed. Prospective development and applicability of negative selection algorithms and their influence on related areas are then speculated based on the discussion.