Information Technology Reference
In-Depth Information
Taylor, D. W. and D. W. Corne. An investigation of the negative selection algorithm for fault
detection in refrigeration systems. h e Proceedings of the Second International Confer-
ence, ICARIS 2003 on Artifi cial Immune Systems , Edinburgh, September 2003.
Timmis, J. and T. Knight. Artifi cial immune systems: Using the immune system as inspi-
ration for Data Mining. In H. A. Abbass, R. A. Sarker and C. S. Newton (Eds.),
Data Mining: A Heuristic Approach , chapter XI, Group Idea Publishing, pp. 209-230,
2001.
Toma, N., S. Endo and K. Yamada. Immune algorithm with immune network and mhc for
adaptive problem solving. Proceedigs of IEEE International Conference on Systems and
Man and Cybernetics (SMC) , Tokyo, IEEE, 1999.
Toma, N., S. Endo and K. Yamada. h e proposal and evaluation of an adaptive memorizing
immune algorithm with two memory mechanisms. J. Jpn. Soc. Artif. Intell. , 15(6),
1097-1106, 2000.
Twycross, J. Integrated innate and adaptive artifi cial immune systems applied to process
anomaly detection. PhD thesis, School of Computer Science, h e University of
Nottingham, 2007.
Varela, F., A. Coutinho, B. Dupire and N. Vaz. Cognitive networks: Immune and neural
and otherwise. h eor. Immunol.: Part Two, SFI Stud. Sci. Complexity , 2, 359-371.
1988.
Wantanabe, Y., A. Ishiguro, Y. Shirai and Y. Uchikawa. Emergent construction of a behav-
ior arbitration mechanism based on the immune system. Adv. Robotics , 12(3), 227-
242, 1998.
Wantanabe, Y., A. Ishiguro and Y. Uchikawa. Decentralized behavior arbitration mecha-
nism for autonomous mobile robot using immune network. Artifi cial Immune Systems
and h eir Applications , Springer, Berlin, pp. 187-207, 1999.
Warrender, C., S. Forrest and B. Pearlmutter. Detecting intrusions using system calls:
Alternative data models. 1999 IEEE Symposium on security and Privacy , 1999.
Yeom, K.-W. Immune-inspired algorithm for anomaly detection. Stud. Comput. Intell.
(SCI) , 57, 129-154, 2007.
Search WWH ::




Custom Search