The use of computational intelligence in intrusion detection systems: A review

SX Wu, W Banzhaf - Applied soft computing, 2010 - Elsevier
Intrusion detection based upon computational intelligence is currently attracting
considerable interest from the research community. Characteristics of computational …

Immune system approaches to intrusion detection–a review

J Kim, PJ Bentley, U Aickelin, J Greensmith… - Natural computing, 2007 - Springer
The use of artificial immune systems in intrusion detection is an appealing concept for two
reasons. First, the human immune system provides the human body with a high level of …

[图书][B] Computational intelligence: an introduction

AP Engelbrecht - 2007 - books.google.com
Computational Intelligence: An Introduction, Second Edition offers an in-depth exploration
into the adaptive mechanisms that enable intelligent behaviour in complex and changing …

Advances in artificial immune systems

D Dasgupta - IEEE computational intelligence magazine, 2006 - ieeexplore.ieee.org
During the last decade, the field of artificial immune system (A1S) is progressing slowly and
steadily as a branch of computational intelligence (CI). There has been increasing interest in …

[图书][B] Immunological computation: theory and applications

D Dasgupta, F Nino - 2008 - taylorfrancis.com
Clearly, nature has been very effective in creating organisms that are capable of protecting
themselves against a wide variety of pathogens such as bacteria, fungi, and parasites. The …

The danger theory and its application to artificial immune systems

U Aickelin, S Cayzer - arXiv preprint arXiv:0801.3549, 2008 - arxiv.org
Over the last decade, a new idea challenging the classical self-non-self viewpoint has
become popular amongst immunologists. It is called the Danger Theory. In this conceptual …

Danger theory: The link between AIS and IDS?

U Aickelin, P Bentley, S Cayzer, J Kim… - Artificial Immune Systems …, 2003 - Springer
We present ideas about creating a next generation Intrusion Detection System (IDS) based
on the latest immunological theories. The central challenge with computer security is …

[图书][B] Self-organization in sensor and actor networks

F Dressler - 2008 - books.google.com
Self-Organization in Sensor and Actor Networks explores self-organization mechanisms and
methodologies concerning the efficient coordination between intercommunicating …

Immune system approaches to intrusion detection–a review

U Aickelin, J Greensmith, J Twycross - … Sicily, Italy, September 13-16, 2004 …, 2004 - Springer
The use of artificial immune systems in intrusion detection is an appealing concept for two
reasons. Firstly, the human immune system provides the human body with a high level of …

Artificial immune systems

U Aickelin, D Dasgupta, F Gu - Search Methodologies: Introductory …, 2013 - Springer
The biological immune system is a robust, complex, adaptive system that defends the body
from foreign pathogens. It is able to categorize all cells (or molecules) within the body as self …