Forrest et al. (1994; 1997) proposed a negative selection algorithm, also termed the exhaustive detector generating algorithm, for various anomaly detection problems. The negative selection algorithm was inspired by the thymic negative selection process that is intrinsic to natural immune systems, consisting of screening and deleting self-reactive T-cells, i.e., those T-cells that recognize self-cells. The negative selection algorithm takes considerable time (exponential to the size of the self-data) and produces redundant detectors. This time/size limitation motivated the development of different approaches to generate the set of candidate detectors. A reasonable way to find suitable parameter settings is to let an evolutionary algorithm d...
Network intrusion detection is the problem of detecting unauthorised use of, or access to, computer ...
This paper presents a framework to generate multi-shaped detectors with valued negative selection al...
This paper proposes an extended negative selection algorithm for anomaly detection. Unlike previousl...
Forrest et al. (1994; 1997) proposed a negative selection algorithm, also termed the exhaustive dete...
This paper presents a novel approach of applying both positive selection and negative selection to s...
The development of an evolutionary algorithm and accompanying software for the generation and optimi...
Artificial immune system (AIS) allows us to inspire several ideas for the design of computer intrusi...
Artificial Immune System (AIS) is a convoluted and complex arrangement derived from biological immun...
Negative selection algorithm is one of the main algorithms of artificial immune systems. However, ca...
Negative selection is a process from the biological immune system that can be applied to two-class (...
The Negative Selection Algorithm (NSA) is a kind of novelty detection method inspired by the biologi...
This paper describes an enhanced negative selection algorithm (NSA) called V-detector. Several key c...
The development of an evolutionary algorithm and accompanying software for the generation and optimi...
Natural immune system (NIS) provides a rich source of inspiration for computer security in the age o...
This paper proposes an extended negative selection algorithm for anomaly detection. Unlike previousl...
Network intrusion detection is the problem of detecting unauthorised use of, or access to, computer ...
This paper presents a framework to generate multi-shaped detectors with valued negative selection al...
This paper proposes an extended negative selection algorithm for anomaly detection. Unlike previousl...
Forrest et al. (1994; 1997) proposed a negative selection algorithm, also termed the exhaustive dete...
This paper presents a novel approach of applying both positive selection and negative selection to s...
The development of an evolutionary algorithm and accompanying software for the generation and optimi...
Artificial immune system (AIS) allows us to inspire several ideas for the design of computer intrusi...
Artificial Immune System (AIS) is a convoluted and complex arrangement derived from biological immun...
Negative selection algorithm is one of the main algorithms of artificial immune systems. However, ca...
Negative selection is a process from the biological immune system that can be applied to two-class (...
The Negative Selection Algorithm (NSA) is a kind of novelty detection method inspired by the biologi...
This paper describes an enhanced negative selection algorithm (NSA) called V-detector. Several key c...
The development of an evolutionary algorithm and accompanying software for the generation and optimi...
Natural immune system (NIS) provides a rich source of inspiration for computer security in the age o...
This paper proposes an extended negative selection algorithm for anomaly detection. Unlike previousl...
Network intrusion detection is the problem of detecting unauthorised use of, or access to, computer ...
This paper presents a framework to generate multi-shaped detectors with valued negative selection al...
This paper proposes an extended negative selection algorithm for anomaly detection. Unlike previousl...