Information Technology Reference
In-Depth Information
References
Ayara, M., J. Timmis, R. de Lemos, L. de Castro and R. Duncan. Negative selection:
How to generate detectors. In Timmis J. and Bentley P. J. (Ed), Proceedings of the 1st
International Conference on Artifi cial Immune Systems (ICARIS) , vol. 1, pp. 89-98,
2002.
Balachandran, S., D. Dasgupta, F. Nino and D. Garrett. A framework for evolving
multi-shaped detectors in negative selection. IEEE Symposium on Foundations of
Computational Intelligence (FOCI) , pp. 401-408, Honolulu, April 1-5, 2007.
Balthrop, J., F. Esponda, S. Forrrest and M. Glickman. Coverage and generalization in an
artifi cial immune system. Proceedings of the Genetic and Evolutionary Computation
Conference (GECCO 2002) , pp. 3-10, Morgan Kaufmann Publishers, New York, July
2002.
Ceong, H. T., Y. I. Kim, D. Lee and K. H. Lee. Complementary dual detectors for eff ective
classifi cation. Proceedings of Second International Conference on Artifi cial Immune
System (ICARIS 2003) , pp. 235-253, Edinburgh, U.K., 2003.
Coutinho, A. h e self non-self discrimination and the nature and acquisition of the antibody
repertoire. Ann. Immunol. (Inst. Past.) , 131D, 1980.
Danezis, G., C. Diaz, S. Faust, E. K¨asper, C. Troncoso and B. Preneel. E cient negative
databases from cryptographic hash functions. In Garay J. A. (Ed), Information
Security Conference 2007 , Springer, Valparaiso, Chile, 2007.
Dasgupta, D. An anomaly detection algorithm inspired by the immune system.
In Dasgupta D. (Ed), Artifi cial Immune Systems and their Applications , Springer,
New York, pp. 262-277, 1999a.
Dasgupta, D. An overview of artifi cial immune systems and their applications. In
Dasgupta D. (Ed), A r t i fi c i a l I m m u n e S y s t e m a n d h eirApplications , Springer, New York,
pp. 3-23, 1999b.
Dasgupta, D. and F. Gonzalez. An immunity-based technique to characterize intrusion in
computer networks. IEEE Trans. Evol. Comput. , 6(3), 1081-1088, 2002.
Dasgupta, D., K. KrishnaKumar, D. Wong and M. Berry. Negative selection algorithm
for aircraft fault detection. Proceedings of h ird International Conference on Artifi cial
Immune Systems (ICARIS 2004) , pp. 1-13, Catania, Italy, 2004.
Dasgupta, D. and D. R. McGregor. A more biologically motivated genetic algorithm: h e
model and some results. Cybern. Syst.: Int. J., 25(3), 447-469, 1994.
D'haeseleer, P. Further E cient Algorithms for Generating Antibody Strings . Technical
Report CS95-3, h e University of New Mexico, Albuquerque, NM, 1995a.
D'haeseleer, P. A Change-Detection Algorithm Inspired by the Immune System: h eory,
Algorithms and Techniques . Technical Report CS95-6, h e University of New Mexico,
Albuquerque, NM, 1995b.
D'haeseleer, P. An immunological approach to change detection: h eoretical results.
Proceedings of the 9th IEEE Computer Security Foundations Workshop , pp. 18-26,
Kenmare, Ireland, June 1996.
D'haeseleer, P., S. Forrest and P. Helman. An immunological approach to change detection:
Algorithms, analysis and implications. Proceedings of the 1996 IEEE Symposium on
Research in Security and Privacy, IEEE Computer Society Press, Los Alamitos, CA,
pp. 110 -119, 1996.
Search WWH ::




Custom Search