The use of computational intelligence in intrusion detection systems: A review
SX Wu, W Banzhaf - Applied soft computing, 2010 - Elsevier
Intrusion detection based upon computational intelligence is currently attracting
considerable interest from the research community. Characteristics of computational …
considerable interest from the research community. Characteristics of computational …
Immune system approaches to intrusion detection–a review
The use of artificial immune systems in intrusion detection is an appealing concept for two
reasons. First, the human immune system provides the human body with a high level of …
reasons. First, the human immune system provides the human body with a high level of …
[图书][B] Computational intelligence: an introduction
AP Engelbrecht - 2007 - books.google.com
Computational Intelligence: An Introduction, Second Edition offers an in-depth exploration
into the adaptive mechanisms that enable intelligent behaviour in complex and changing …
into the adaptive mechanisms that enable intelligent behaviour in complex and changing …
Advances in artificial immune systems
D Dasgupta - IEEE computational intelligence magazine, 2006 - ieeexplore.ieee.org
During the last decade, the field of artificial immune system (A1S) is progressing slowly and
steadily as a branch of computational intelligence (CI). There has been increasing interest in …
steadily as a branch of computational intelligence (CI). There has been increasing interest in …
[图书][B] Immunological computation: theory and applications
D Dasgupta, F Nino - 2008 - taylorfrancis.com
Clearly, nature has been very effective in creating organisms that are capable of protecting
themselves against a wide variety of pathogens such as bacteria, fungi, and parasites. The …
themselves against a wide variety of pathogens such as bacteria, fungi, and parasites. The …
The danger theory and its application to artificial immune systems
U Aickelin, S Cayzer - arXiv preprint arXiv:0801.3549, 2008 - arxiv.org
Over the last decade, a new idea challenging the classical self-non-self viewpoint has
become popular amongst immunologists. It is called the Danger Theory. In this conceptual …
become popular amongst immunologists. It is called the Danger Theory. In this conceptual …
Danger theory: The link between AIS and IDS?
We present ideas about creating a next generation Intrusion Detection System (IDS) based
on the latest immunological theories. The central challenge with computer security is …
on the latest immunological theories. The central challenge with computer security is …
[图书][B] Self-organization in sensor and actor networks
F Dressler - 2008 - books.google.com
Self-Organization in Sensor and Actor Networks explores self-organization mechanisms and
methodologies concerning the efficient coordination between intercommunicating …
methodologies concerning the efficient coordination between intercommunicating …
Immune system approaches to intrusion detection–a review
The use of artificial immune systems in intrusion detection is an appealing concept for two
reasons. Firstly, the human immune system provides the human body with a high level of …
reasons. Firstly, the human immune system provides the human body with a high level of …
Artificial immune systems
The biological immune system is a robust, complex, adaptive system that defends the body
from foreign pathogens. It is able to categorize all cells (or molecules) within the body as self …
from foreign pathogens. It is able to categorize all cells (or molecules) within the body as self …