Theoretical advances in artificial immune systems
Artificial immune systems (AIS) constitute a relatively new area of bio-inspired computing.
Biological models of the natural immune system, in particular the theories of clonal selection …
Biological models of the natural immune system, in particular the theories of clonal selection …
[PDF][PDF] On the appropriateness of negative selection for anomaly detection and network intrusion detection
T Stibor - 2006 - tuprints.ulb.tu-darmstadt.de
The immune system is a complex system which protects humans and animals against
diseases caused by foreign intruders such as viruses, bacteria and fungi. It appears as if the …
diseases caused by foreign intruders such as viruses, bacteria and fungi. It appears as if the …
The link between r-contiguous detectors and k-CNF satisfiability
In the context of generating detectors using the r-contiguous matching rule, questions have
been raised at the efficiency of the process. We show that the problem of generating r …
been raised at the efficiency of the process. We show that the problem of generating r …
Phase Transition and the Computational Complexity of Generating r-Contiguous Detectors
T Stibor - International Conference on Artificial Immune Systems, 2007 - Springer
The problem of generating r-contiguous detectors in negative selection can be transformed
in the problem of finding assignment sets for a Boolean formula in k-CNF. Knowing this …
in the problem of finding assignment sets for a Boolean formula in k-CNF. Knowing this …
Foundations of r-contiguous matching in negative selection for anomaly detection
T Stibor - Natural Computing, 2009 - Springer
Negative selection and the associated r-contiguous matching rule is a popular immune-
inspired method for anomaly detection problems. In recent years, however, problems such …
inspired method for anomaly detection problems. In recent years, however, problems such …
Energy efficient security in MANETs: A comparison of cryptographic and artificial immune systems
N Mazhar - Pakistan Journal of Engineering and Applied Sciences, 2010 - 111.68.102.14
MANET is characterised by a set of mobile nodes in an inherently insecure environment,
having limited battery capacities. Provisioning of energy efficient security in MANETs is …
having limited battery capacities. Provisioning of energy efficient security in MANETs is …
[PDF][PDF] Danger theory metaphor in artificial immune system for system call data
A Iqbal - 2006 - eprints.utm.my
ABSTRACT Artificial Immune System (AIS) is a naive paradigm in biologically inspired
computation; artificial neural networks (ANNs) and genetic algorithms (GAs) are among …
computation; artificial neural networks (ANNs) and genetic algorithms (GAs) are among …
Present condition and causes of Decay of tomb of Jahangir at Shahdara, Lahore
MY Awan, NS Kazmi - Pakistan Journal of Engineering and Applied …, 2008 - 111.68.102.14
All the materials used in the construction of historical buildings undergo deterioration when
exposed to aggressive environments. The rate and symptoms of such a process is …
exposed to aggressive environments. The rate and symptoms of such a process is …
Extended thymus action for improving response of AIS based NID system against malicious traffic
Artificial immune systems (AISs) are being increasingly utilized to develop network intrusion
detection (NID) systems. The fundamental reason for their success in NID is their ability to …
detection (NID) systems. The fundamental reason for their success in NID is their ability to …
[PDF][PDF] Implementation of a computer immune system for intrusion and virus detection
MC Unterleitner - 2006 - priv.gg
The number of reported incidents on local area networks (LANs) and further on individual
computer systems are continually increasing since mid of the last decade. The governments …
computer systems are continually increasing since mid of the last decade. The governments …