Information Technology Reference
In-Depth Information
e. Scheduling
f. Computer security
g. Anomaly detection
h. Neural networks
i. Data mining
4. Study other research areas where AINEs have been successfully used. Identify
the main features of these approaches.
References
Abbattista, F., G. Di Santo, G. Di Gioia and M. Fanelli. An associative memory based on
the immune networks. Proceedings of the International Conference on Neural Networks ,
Washington, DC, 1996.
Aickelin, U. and J. Greensmith. Sensing danger: Innate immunology for intrusion detec-
tion. Inform. Secur. Tech. Rep. , 12(4), 218-227, 2007.
Aicklen, U., P. Bentley, S. Cayzer, J. Kim and J. McLeod. Danger theory: h e link between
ais and ids. h e Proceedings of the h ird International Conference, ICARIS 2003 on
Artifi cial Immune Systems , Edinburgh, pp. 156-167, 2003.
Balthrop, J., S. Forrest and M. Glickman. Revisiting lisys: Parameters and normal behav-
ior. Proceedings of the Congress on Evolutionary Computation , Honolulu, HI, pp.
1045 -1050, 2002.
Bersini, H. and F. Varela. Hints for adaptive problem solving gleaned from immune net-
work. In H. P. Schwefel and H. M'hlenbein (Eds.), Parallel Problem Solving from
Nature , Springer, Berlin, pp. 343-354, 1990.
Carter, J. H. h e immune system as a model for pattern recognition and classifi cation. J.
Am. Med. Inf. Assoc. , 7(1), 28-41, 2000.
Coello, C. A. C. and N. C. Cortes. Use of emulations of the immune system to handle
constraints in evolutionary algorithms. Proceedings of ANNIE 2002 , St. Louis, MO,
2002.
Coello, C. A. C., D. C. Rivera and N. C. Cortes. Use of an artifi cial immune system for job
shop scheduling. h e Proceedings of the Second International Conference, ICARIS 2003
on Artifi cial Immune Systems , Edinburgh, September 2003.
Cooke, D. E. and J. E. Hunt. Recognizing promoter sequences using an artifi cial immune
system. Proceedings Intelligent Systems in Molecular Biology (ISMB'95) , AAAI Press,
Cambridge, U.K., pp. 89-97, 1995.
Dasgupta, D. Using immunological principles in anomaly detection. Proceedings of the Arti-
fi cial Neural Networks in Engineering (ANNIE'96) , St. Louis, MO, November 10-13,
1996.
Dasgupta, D. Immunity-based intrusion detection systems: A general framework. h e
Proceedings of the 22nd National Information Systems Security Conference (NISSC) ,
Arlington, VA, October 18-21, 1999.
Dasgupta, D. and S. Forrest. Novelty detection in time series data using ideas from immu-
nology. ISCA 5th International Conference on Intelligent Systems , Reno, Nevada, June
19 -21, 1996.
Search WWH ::




Custom Search