1 |
L. N. de Castro and J. I. Timmis, "Artificial immune systems as a novel soft computing paradigm," Soft Computing, vol. 7, no. 8, pp. 526-544, 2003.
DOI
|
2 |
J. Shifflet, "A technique independent fusion model for network intrusion detection," in Proceedings of the Midstates Conference for Undergraduate Research in Computer Science and Mathematics, Wooster, OH, 2005, pp. 13-19.
|
3 |
S. Forrest, A. S. Perelson, L. Allen, and R. Cherukuri, "Self-nonself discrimination in a computer," in Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy, Oakland, CA,1994, pp. 202-212.
|
4 |
S. Hofmeyr and S. Forrest, "Immunity by design: an artificial immune system," in Proceedings of the Genetic and Evolutionary Computation Conference, Orlando, FL, 1999, pp. 1289-1296.
|
5 |
S. Hofmeyr and S. Forrest, "Architecture for an artificial immune system," Evolutionary Computation, vol. 8, no. 4, pp. 443-473, 2000.
DOI
|
6 |
D. Dasgupta and S. Forrest, "Artificial immune systems in industrial applications," in Proceedings of the 2nd International Conference on Intelligent Processing and Manufacturing of Materials, Honolulu, HI, 1999, pp. 257-267.
|
7 |
J. Kim and P. J. Bentley, "Towards an artificial immune system for network intrusion detection: an investigation of dynamic clonal selection," in Proceedings of the Congress on Evolutionary Computation, Honolulu, HI, 2002, pp. 1015-1020.
|
8 |
J. Kim, P. J. Bentley, U. Aickelin, J. Greensmith, G. Tedesco, and J. Twycross, "Immune system approaches to intrusion detection: a review," Natural Computing, vol. 6, no. 4, pp. 413-466, 2007.
DOI
|
9 |
P. D. Williams, K. P. Anchor, J. L. Bebo, G. H. Gunsch, and G. D. Lamont, "CDIS: towards a computer immune system for detecting network intrusions," in International Workshop on Recent Advances in Intrusion Detection. Heidelberg: Springer, 2001, pp. 117-133.
|
10 |
P. K. Harmer, P. D. Williams, G. H. Gunsch, and G. B. Lamont, "An artificial immune system architecture for computer security applications," IEEE Transactions on Evolutionary Computation, vol. 6, no. 3, pp. 252-280, 2002.
DOI
|
11 |
U. Aickelin, P. Bentley, S. Cayzer, J. Kim, and J. McLeod, "Danger theory: the link between AIS and IDS?," in International Conference on Artificial Immune Systems. Heidelberg: Springer, 2003, pp. 147-155.
|
12 |
J. Greensmith, U. Aickelin, and G. Tedesco, "Information fusion for anomaly detection with the dendritic cell algorithm," Information Fusion, vol. 11, no. 1, pp. 21-34, 2010.
DOI
|
13 |
D. Y. Li, C. Y. Liu, and L. Y. Liu, "Study on the universality of the normal cloud model," Engineering Science, vol. 6, no. 8, pp. 28-34, 2004.
DOI
|
14 |
D. Y. Li, H. J. Meng, and X. M. Shi, "Membership clouds and membership cloud generators," Computer Research and Development, vol. 32, no. 6, pp. 15-20, 1995.
|
15 |
S. Rathore, A. Saxena, and M. Manoria, "Intrusion detection system on KDDCup99 dataset: a survey," International Journal of Computer Science and Information Technologies, vol. 6, no. 4, pp. 3345-334, 2015.
|