Evolutionary design by computers P Bentley Morgan Kaufmann, 1999 | 1149* | 1999 |
Creative evolutionary systems P Bentley, DW Corne Morgan Kaufmann, 2002 | 545 | 2002 |
Danger theory: The link between AIS and IDS? U Aickelin, P Bentley, S Cayzer, J Kim, J McLeod Artificial Immune Systems: Second International Conference, ICARIS 2003 …, 2003 | 524 | 2003 |
Immune system approaches to intrusion detection–a review J Kim, PJ Bentley, U Aickelin, J Greensmith, G Tedesco, J Twycross Natural computing 6, 413-466, 2007 | 423 | 2007 |
Three ways to grow designs: A comparison of embryogenies for an evolutionary design problem. PJ Bentley, S Kumar GECCO 99, 35-43, 1999 | 413 | 1999 |
An evaluation of negative selection in an artificial immune system for network intrusion detection J Kim, PJ Bentley Proceedings of the 3rd Annual Conference on Genetic and Evolutionary …, 2001 | 409 | 2001 |
Towards an artificial immune system for network intrusion detection: an investigation of dynamic clonal selection J Kim, PJ Bentley Proceedings of the 2002 Congress on Evolutionary Computation. CEC'02 (Cat …, 2002 | 378 | 2002 |
Finding acceptable solutions in the pareto-optimal range using multiobjective genetic algorithms PJ Bentley, JP Wakefield Soft computing in engineering design and manufacturing, 231-240, 1998 | 367 | 1998 |
Towards an artificial immune system for network intrusion detection: An investigation of clonal selection with a negative selection operator J Kim, PJ Bentley Proceedings of the 2001 Congress on Evolutionary Computation (IEEE Cat. No …, 2001 | 360 | 2001 |
The surprising creativity of digital evolution: A collection of anecdotes from the evolutionary computation and artificial life research communities J Lehman, J Clune, D Misevic, C Adami, L Altenberg, J Beaulieu, ... Artificial life 26 (2), 274-306, 2020 | 330 | 2020 |
Dynamic search with charged swarms TM Blackwell, PJ Bentley Proceedings of the 4th annual conference on genetic and evolutionary …, 2002 | 303 | 2002 |
The artificial immune model for network intrusion detection J Kim, P Bentley 7th European Conference on Intelligent Techniques and Soft Computing (EUFIT …, 1999 | 257 | 1999 |
Investigating country differences in mobile app user behavior and challenges for software engineering SL Lim, PJ Bentley, N Kanakam, F Ishikawa, S Honiden IEEE Transactions on Software Engineering 41 (1), 40-64, 2014 | 254 | 2014 |
On growth, form and computers S Kumar, PJ Bentley Elsevier, 2003 | 229 | 2003 |
The human immune system and network intrusion detection J Kim, P Bentley 7th European Conference on Intelligent Techniques and Soft Computing (EUFIT …, 1999 | 222 | 1999 |
Immune memory in the dynamic clonal selection algorithm J Kim, PJ Bentley Proceedings of the First International Conference on Artificial Immune …, 2002 | 198* | 2002 |
Don't push me! Collision-avoiding swarms TM Blackwell, P Bentley Proceedings of the 2002 Congress on Evolutionary Computation. CEC'02 (Cat …, 2002 | 195 | 2002 |
Particle swarm optimization recommender system S Ujjin, PJ Bentley Proceedings of the 2003 IEEE Swarm Intelligence Symposium. SIS'03 (Cat. No …, 2003 | 165 | 2003 |
Improvised music with swarms TM Blackwell, P Bentley Proceedings of the 2002 Congress on Evolutionary Computation. CEC'02 (Cat …, 2002 | 156 | 2002 |
Digital biology: how nature is transforming our technology and our lives PJ Bentley Simon and Schuster, 2001 | 155* | 2001 |