Artificial Immune Systems approaches to secure the internet of things: A systematic review of the literature and recommendations for future research

S Aldhaheri, D Alghazzawi, L Cheng, A Barnawi… - Journal of Network and …, 2020 - Elsevier
Abstract As the Internet of Things (IoT) recently attains tremendous popularity, this promising
technology leads to a variety of security challenges. The traditional solutions do not fit the …

DeepDCA: novel network-based detection of IoT attacks using artificial immune system

S Aldhaheri, D Alghazzawi, L Cheng, B Alzahrani… - Applied Sciences, 2020 - mdpi.com
Recently Internet of Things (IoT) attains tremendous popularity, although this promising
technology leads to a variety of security obstacles. The conventional solutions do not suit the …

A hybrid technique using binary particle swarm optimization and decision tree pruning for network intrusion detection

AJ Malik, FA Khan - Cluster Computing, 2018 - Springer
A major drawback of signature-based intrusion detection systems is the inability to detect
novel attacks that do not match the known signatures already stored in the database …

Artificial immune systems applied to the reconfiguration of electrical power distribution networks for energy loss minimization

LW De Oliveira, EJ de Oliveira, FV Gomes… - International Journal of …, 2014 - Elsevier
This paper presents a methodology for the reconfiguration of radial electrical distribution
systems based on the bio-inspired meta-heuristic Artificial Immune System to minimize …

Revisiting the foundations of artificial immune systems for data mining

AA Freitas, J Timmis - IEEE Transactions on Evolutionary …, 2007 - ieeexplore.ieee.org
This paper advocates a problem-oriented approach for the design of artificial immune
systems (AIS) for data mining. By problem-oriented approach we mean that, in real-world …

Network intrusion detection using hybrid binary PSO and random forests algorithm

AJ Malik, W Shahzad, FA Khan - Security and Communication …, 2015 - Wiley Online Library
Network security risks grow with increase in the network size. In recent past, the attacks on
computer networks have increased tremendously and require efficient network intrusion …

Intrusion detection model based on particle swarm optimization and support vector machine

S Srinoy - … IEEE Symposium on Computational Intelligence in …, 2007 - ieeexplore.ieee.org
Advance in information and communication technologies, force us to keep most of the
information electronically, consequently, the security of information has become a …

Artificial immune systems: models, applications, and challenges

SA Mohamed Elsayed, RA Ammar… - Proceedings of the 27th …, 2012 - dl.acm.org
The Natural Immune System (NIS) is a distributed, multi-layered, adaptive, dynamic, and life-
long learning system. The Artificial Immune System (AIS) is a computational system inspired …

An evolutionary memetic algorithm for rule extraction

JH Ang, KC Tan, AA Mamun - Expert Systems with Applications, 2010 - Elsevier
In this paper, an Evolutionary Memetic Algorithm (EMA), which uses a local search intensity
scheme to complement the global search capability of Evolutionary Algorithms (EAs), is …

Machine learning approach to model sport training

E Me, O Unold - Computers in human behavior, 2011 - Elsevier
The aim of this study was to use a machine learning approach combining fuzzy modeling
with an immune algorithm to model sport training, in particular swimming. A proposed …