Theoretical advances in artificial immune systems

J Timmis, A Hone, T Stibor, E Clark - Theoretical Computer Science, 2008 - Elsevier
Artificial immune systems (AIS) constitute a relatively new area of bio-inspired computing.
Biological models of the natural immune system, in particular the theories of clonal selection …

[PDF][PDF] On the appropriateness of negative selection for anomaly detection and network intrusion detection

T Stibor - 2006 - tuprints.ulb.tu-darmstadt.de
The immune system is a complex system which protects humans and animals against
diseases caused by foreign intruders such as viruses, bacteria and fungi. It appears as if the …

The link between r-contiguous detectors and k-CNF satisfiability

T Stibor, J Timmis, C Eckert - 2006 IEEE International …, 2006 - ieeexplore.ieee.org
In the context of generating detectors using the r-contiguous matching rule, questions have
been raised at the efficiency of the process. We show that the problem of generating r …

Phase Transition and the Computational Complexity of Generating r-Contiguous Detectors

T Stibor - International Conference on Artificial Immune Systems, 2007 - Springer
The problem of generating r-contiguous detectors in negative selection can be transformed
in the problem of finding assignment sets for a Boolean formula in k-CNF. Knowing this …

Foundations of r-contiguous matching in negative selection for anomaly detection

T Stibor - Natural Computing, 2009 - Springer
Negative selection and the associated r-contiguous matching rule is a popular immune-
inspired method for anomaly detection problems. In recent years, however, problems such …

Energy efficient security in MANETs: A comparison of cryptographic and artificial immune systems

N Mazhar - Pakistan Journal of Engineering and Applied Sciences, 2010 - 111.68.102.14
MANET is characterised by a set of mobile nodes in an inherently insecure environment,
having limited battery capacities. Provisioning of energy efficient security in MANETs is …

[PDF][PDF] Danger theory metaphor in artificial immune system for system call data

A Iqbal - 2006 - eprints.utm.my
ABSTRACT Artificial Immune System (AIS) is a naive paradigm in biologically inspired
computation; artificial neural networks (ANNs) and genetic algorithms (GAs) are among …

Present condition and causes of Decay of tomb of Jahangir at Shahdara, Lahore

MY Awan, NS Kazmi - Pakistan Journal of Engineering and Applied …, 2008 - 111.68.102.14
All the materials used in the construction of historical buildings undergo deterioration when
exposed to aggressive environments. The rate and symptoms of such a process is …

Extended thymus action for improving response of AIS based NID system against malicious traffic

MZ Shafiq, M Kiani, B Hashmi… - 2007 IEEE Congress on …, 2007 - ieeexplore.ieee.org
Artificial immune systems (AISs) are being increasingly utilized to develop network intrusion
detection (NID) systems. The fundamental reason for their success in NID is their ability to …

[PDF][PDF] Implementation of a computer immune system for intrusion and virus detection

MC Unterleitner - 2006 - priv.gg
The number of reported incidents on local area networks (LANs) and further on individual
computer systems are continually increasing since mid of the last decade. The governments …