Artificial Immune Systems approaches to secure the internet of things: A systematic review of the literature and recommendations for future research
Abstract As the Internet of Things (IoT) recently attains tremendous popularity, this promising
technology leads to a variety of security challenges. The traditional solutions do not fit the …
technology leads to a variety of security challenges. The traditional solutions do not fit the …
DeepDCA: novel network-based detection of IoT attacks using artificial immune system
Recently Internet of Things (IoT) attains tremendous popularity, although this promising
technology leads to a variety of security obstacles. The conventional solutions do not suit the …
technology leads to a variety of security obstacles. The conventional solutions do not suit the …
A hybrid technique using binary particle swarm optimization and decision tree pruning for network intrusion detection
AJ Malik, FA Khan - Cluster Computing, 2018 - Springer
A major drawback of signature-based intrusion detection systems is the inability to detect
novel attacks that do not match the known signatures already stored in the database …
novel attacks that do not match the known signatures already stored in the database …
Artificial immune systems applied to the reconfiguration of electrical power distribution networks for energy loss minimization
LW De Oliveira, EJ de Oliveira, FV Gomes… - International Journal of …, 2014 - Elsevier
This paper presents a methodology for the reconfiguration of radial electrical distribution
systems based on the bio-inspired meta-heuristic Artificial Immune System to minimize …
systems based on the bio-inspired meta-heuristic Artificial Immune System to minimize …
Revisiting the foundations of artificial immune systems for data mining
AA Freitas, J Timmis - IEEE Transactions on Evolutionary …, 2007 - ieeexplore.ieee.org
This paper advocates a problem-oriented approach for the design of artificial immune
systems (AIS) for data mining. By problem-oriented approach we mean that, in real-world …
systems (AIS) for data mining. By problem-oriented approach we mean that, in real-world …
Network intrusion detection using hybrid binary PSO and random forests algorithm
Network security risks grow with increase in the network size. In recent past, the attacks on
computer networks have increased tremendously and require efficient network intrusion …
computer networks have increased tremendously and require efficient network intrusion …
Intrusion detection model based on particle swarm optimization and support vector machine
S Srinoy - … IEEE Symposium on Computational Intelligence in …, 2007 - ieeexplore.ieee.org
Advance in information and communication technologies, force us to keep most of the
information electronically, consequently, the security of information has become a …
information electronically, consequently, the security of information has become a …
Artificial immune systems: models, applications, and challenges
SA Mohamed Elsayed, RA Ammar… - Proceedings of the 27th …, 2012 - dl.acm.org
The Natural Immune System (NIS) is a distributed, multi-layered, adaptive, dynamic, and life-
long learning system. The Artificial Immune System (AIS) is a computational system inspired …
long learning system. The Artificial Immune System (AIS) is a computational system inspired …
An evolutionary memetic algorithm for rule extraction
In this paper, an Evolutionary Memetic Algorithm (EMA), which uses a local search intensity
scheme to complement the global search capability of Evolutionary Algorithms (EAs), is …
scheme to complement the global search capability of Evolutionary Algorithms (EAs), is …
Machine learning approach to model sport training
E Me, O Unold - Computers in human behavior, 2011 - Elsevier
The aim of this study was to use a machine learning approach combining fuzzy modeling
with an immune algorithm to model sport training, in particular swimming. A proposed …
with an immune algorithm to model sport training, in particular swimming. A proposed …