Skip to main content
A method for anomaly detection is introduced in which "normal" is defined by short-range correlations in a process' system calls. Initial experiments suggest that the definition is stable during normal behavior for standard UNIX programs.... more
    • by 
    •   15  
      Computer ScienceSoftware EngineeringArtificial Immune SystemsUnix
Intrusion detection based upon computational intelligence is currently attracting considerable interest from the research community. Characteristics of computational intelligence (CI) systems, such as adaptation, fault tolerance, high... more
    • by 
    •   16  
      Information SystemsApplied MathematicsArtificial Immune SystemsComputational Intelligence
D uring the last decade, the field of Artificial Immune System (AIS) is progressing slowly and steadily as a branch of Computational Intelligence (CI) as shown in .There has been increasing interest in the development of computational... more
    • by 
    •   9  
      Artificial IntelligenceArtificial Immune SystemsComputational IntelligenceCellular Automata
With increased global interconnectivity, reliance on e-commerce, network services, and Internet communication, computer security has become a necessity. Organizations must protect their systems from intrusion and computer-virus attacks.... more
    • by 
    •   31  
      Information SystemsComputer ArchitectureArtificial Immune SystemsComputer Networks
    • by 
    •   11  
      Artificial IntelligenceArtificial Immune SystemsCompetitive IntelligenceNumerical Method
After a decade of research into the area of artificial immune systems, it is worthwhile to take a step back and reflect on the contributions that the paradigm has brought to the application areas to which it has been applied. Undeniably,... more
    • by 
    •   4  
      Information SystemsApplied MathematicsArtificial Immune SystemsArtificial Immune System
Dendritic cells are antigen presenting cells that provide a vital link between the innate and adaptive immune system. Research into this family of cells has revealed that they perform the role of coordinating T-cell based immune... more
    • by 
    • Artificial Immune Systems
Biological systems such as human beings can be regarded as sophisticated information processing systems, and can be expected to provide inspiration for various ideas to science and engineering. Biologicallymotivated information processing... more
    • by 
    •   12  
      GeneticsArtificial Immune SystemsEvolutionary ComputationNeural Network
Background-T-cell-mediated immunity contributes to the pathogenesis of atherosclerosis, but little is known about how these responses are regulated. We explored the influence of the inducible costimulatory molecule (ICOS) on... more
    • by  and +1
    •   7  
      Artificial Immune SystemsAtherosclerosisMiceClinical Sciences
We investigated a real-valued Negative Selection Algorithm (NSA) for fault detection in man-in-the-loop aircraft operation. The detection algorithm uses body-axes angular rate sensory data exhibiting the normal flight behavior patterns,... more
    • by 
    •   3  
      Artificial Immune SystemsFault DetectionNegative Selection Algorithm
Negative selection algorithms for hamming and real-valued shape-spaces are reviewed. Problems are identified with the use of these shape-spaces, and the negative selection algorithm in general, when applied to anomaly detection. A... more
    • by 
    •   7  
      Artificial Immune SystemsAnomaly DetectionArtificial Immune SystemSupport vector machine
This paper presents a generalization of the graphbased genetic programming (GP) technique known as Cartesian genetic programming (CGP). We have extended CGP by utilizing automatic module acquisition, evolution, and reuse. To benchmark the... more
    • by 
    •   18  
      Information SystemsArtificial IntelligenceHeuristicsGraph Theory
The (randomized) real-valued negative selection algorithm is an anomaly detection approach, inspired by the negative selection immune system principle. The algorithm was proposed to overcome scaling problems inherent in the hamming... more
    • by 
    •   6  
      Artificial Immune SystemsAnomaly DetectionPositive SelectionHigh Dimensionality
Accurate and fast islanding detection of distributed generation is highly important for its successful operation in distribution networks. Up to now, various islanding detection technique based on communication, passive, active and... more
    • by 
    •   44  
      Artificial Immune SystemsFuzzy LogicFuzzy Logic ControlSupport Vector Machines
In mobile ad-hoc networks, nodes act both as terminals and information relays, and they participate in a common routing protocol, such as Dynamic Source Routing (DSR). The networks are vulnerable to routing misbehavior, due to faulty or... more
    • by 
    •   10  
      Decision MakingArtificial Immune SystemsMemoryClustering
This paper presents a comparative study of two important Clonal Selection Algorithms (CSAs): CLONALG and opt-IA. To deeply understand the performance of both algorithms, we deal with four different classes of problems: toy problems... more
    • by 
    •   16  
      Molecular BiologyArtificial Immune SystemsProtein Structure PredictionPattern Recognition
The Dendritic Cell algorithm (DCA) is inspired by recent work in innate immunity. In this paper a formal description of the DCA is given. The DCA is described in detail, and its use as an anomaly detector is illustrated within the context... more
    • by 
    • Artificial Immune Systems
    • by 
    •   23  
      Artificial Immune SystemsGenetic AlgorithmsPower SystemBack Propagation
    • by  and +1
    •   15  
      EngineeringInformaticsArtificial Immune SystemsGenetic Algorithms
Dendritic cells are antigen presenting cells that provide a vital link between the innate and adaptive immune system, providing the initial detection of pathogenic invaders. Research into this family of cells has revealed that they... more
    • by 
    • Artificial Immune Systems
This paper addresses the problem of electric distribution network expansion under condition of uncertainty in the evolution of node loads in a time horizon. An immune-based evolutionary optimization algorithm is developed here, in order... more
    • by 
    •   19  
      Power SystemsArtificial Immune SystemsEvolutionary ComputationMonte Carlo Simulation
Artificial immune systems, more specifically the negative selection algorithm, have previously been applied to intrusion detection. The aim of this research is to develop an intrusion detection system based on a novel concept in... more
    • by 
    • Artificial Immune Systems
The concept of an information immune system (IIS) is introduced, in which undesirable information is eliminated before it can reach the user. The IIS is inspired by the natural immune systems that protect us from pathogens. IISs from... more
    • by 
    •   5  
      TechnologyArtificial Immune SystemsCollaborative FilteringMathematical Sciences
The immune system exhibits properties such as learning, distributivity continual adaptation, context dependent response and memory during the lifetime of a host. This paper argues that such properties are essential for the creation of... more
    • by 
    •   4  
      Ubiquitous ComputingArtificial Immune SystemsImmune systemContext Aware
In mobile ad-hoc networks, nodes act both as terminals and information relays, and participate in a common routing protocol, such as Dynamic Source Routing (DSR). The network is vulnerable to routing misbehavior, due to faulty or... more
    • by 
    •   9  
      Mobile Ad Hoc NetworksArtificial Immune SystemsMobile Ad Hoc NetworkArtificial Immune System
    • by 
    • Artificial Immune Systems
This work presents the application of the omni-aiNet algorithm-an immune-inspired algorithm originally developed to solve single and multi-objective optimization problems-to the reconstruction of phylogenetic trees. The main goal here is... more
    • by 
    •   19  
      Cognitive ScienceMathematicsComputer ScienceMethodology
    • by 
    •   22  
      EpidemiologyNutritionArtificial Immune SystemsHealth Care
Artificial immune systems have previously been applied to the problem of intrusion detection. The aim of this research is to develop an intrusion detection system based on the function of Dendritic Cells (DCs). DCs are antigen presenting... more
    • by 
    • Artificial Immune Systems
The human immune system provides inspiration in the attempt of solving the knowledge acquisition bottleneck in developing ontology for semantic web application. In this paper, we proposed an extension to the Guided Agglomerative... more
    • by 
    •   17  
      Machine LearningArtificial Immune SystemsOntology DevelopmentNatural Computing
This work proposes a classification-rule discovery algorithm integrating artificial immune systems and fuzzy systems. The algorithm consists of two parts: a sequential covering procedure and a rule evolution procedure. Each antibody... more
    • by 
    •   11  
      Data MiningArtificial Immune SystemsFuzzy LogicHybrid Systems
In this paper, we have made medical application of a new artificial immune system named the information gain-based artificial immune recognition system (IG-AIRS) which is minimized the negative effects of taking into account all... more
    • by 
    •   14  
      Artificial Immune SystemsPerformance AnalysisMathematical SciencesArtificial Immune System
This work presents omni-aiNet, an immune-inspired algorithm developed to solve single and multi-objective optimization problems, either with single and multi-global solutions. The search engine is capable of automatically adapting the... more
    • by 
    •   11  
      Computer ScienceArtificial IntelligenceArtificial Immune SystemsMathematical Programming
Some biological phenomena offer clues to solving real-life, complex problems. Researchers have been studying techniques such as neural networks and genetic algorithms for computational intelligence and their applications to such complex... more
    • by 
    •   5  
      Information SystemsArtificial Immune SystemsEBusinessSecurity Management
    • by 
    •   15  
      Information SystemsApplied MathematicsCombinatorial OptimizationArtificial Immune Systems
Ensuring the security of computers is a nontrivial task, with many techniques used by malicious users to compromise these systems. In recent years a new threat has emerged in the form of networks of hijacked zombie machines used to... more
    • by 
    • Artificial Immune Systems
The immune system provides an ideal metaphor for anomaly detection in general and computer security in particular. Based on this idea, artificial immune systems have been used for a number of years for intrusion detection, unfortunately... more
    • by 
    • Artificial Immune Systems
    • by 
    • Artificial Immune Systems
"The Pareto front can provide valuable information on land-use planning decision by revealing the possible trade-offs among multiple, conflicting objectives. However, seeking the Pareto front of land-use allocation is much more difficult... more
    • by 
    •   4  
      Artificial Immune SystemsMulti-Objective OptimizationMultisite Land Use AllocationGeographic Information Systems (GIS)
In this article, we present a parallel image processing system based on the concept of reactive agents. Our system lies in the oRis language, which allows to describe ÿnely and simply the agents' behaviors to detect image features. We... more
    • by 
    •   7  
      Image ProcessingArtificial Immune SystemsPattern RecognitionMulti Agent System
A sensor network is a collection of wireless devices that are able to monitor physical or environmental conditions. These devices (nodes) are expected to operate autonomously, be battery powered and have very limited computational... more
    • by 
    •   5  
      Artificial Immune SystemsWireless Sensor NetworksArtificial Immune SystemSensor Network
This paper presents a framework to generate multi-shaped detectors with valued negative selection algorithms (NSA). In particular, detectors can take the form of hyper-rectangles, hyper-spheres and hyper-ellipses in the non-self space.... more
    • by 
    •   18  
      BioinformaticsGeneticsComputer ScienceEvolutionary algorithms
We present a swarm-based, 3-dimensional model of the human immune system and its response to first and second viral antigen exposure. Our model utilizes a decentralized swarm approach with multiple agents acting independently—following... more
    • by 
    •   6  
      Artificial Immune SystemsAgent Based SimulationDimensionalViral Infection
Do artificial immune systems (AIS) have something to offer the world of optimisation? Indeed do they have any new to offer at all? This paper reports the initial findings of a comparison between two immune inspired algorithms and a hybrid... more
    • by 
    •   7  
      Artificial Immune SystemsGenetic AlgorithmsProduction SystemsArtificial Immune System
Using hyperspheres as antibody recognition regions is an established abstraction which was initially proposed by theoretical immunologists for use in the modeling of antibody-antigen interactions. This abstraction is also employed in the... more
    • by 
    •   3  
      Artificial Immune SystemsArtificial Immune SystemNegative Selection Algorithm
Page 1. Inspiration for the Next Generation of Artificial Immune Systems Paul S. Andrews1 and Jon Timmis2 1 Department of Computer Science, University of York, UK [email protected] 2 Departments of Electronics and Computer ...
    • by 
    •   4  
      Artificial Immune SystemsArtificial Immune SystemImmune systemNext Generation
MHC molecules, also known in the human as human leukocyte antigens (HLA), display peptides on antigen presenting cell surfaces for subsequent T cell recognition. Identification of these antigenic peptides is especially important for... more
    • by 
    •   3  
      Artificial Immune SystemsPolymorphismBiochemistry and cell biology
... that in a certain part of the body an immune response of one class may be efficient, but the ... We feel this would be particularly suitable for a dynamic environment such as the internet. ... Similarly a web usage mining system may... more
    • by 
    •   4  
      Artificial Immune SystemsWeb MiningArtificial Immune SystemImmune system
Many recent advances have been made in understanding the functional implications of the global topological properties of biological networks through the application of complex network theory, particularly in the area of small-world and... more
    • by 
    •   12  
      Artificial Immune SystemsComplex NetworksTopologyNatural Computing
    • by 
    •   7  
      Information SystemsApplied MathematicsMobile Ad Hoc NetworksArtificial Immune Systems