Filters








19,292 Hits in 4.7 sec

An Artificial Immune Algorithms Apply to Pre-processing Signals [chapter]

Mariusz Święcicki, Wiesław Wajs, Piotr Wais
2004 Lecture Notes in Computer Science  
This paper presents the theory of an immune network model, and it tries to apply to solve signal classification problems.  ...  The more notable developments have been the neural networks inspired by the working of the brain, and the evolutionary algorithms inspired by neo-Darwinian theory of evolution.  ...  An Artificial Immune Network for Signal Analysis Main goal our system is classification signals so there are some problems that have to solve.  ... 
doi:10.1007/978-3-540-24687-9_107 fatcat:awcsigbih5d7rmsnofso2ybthe

DCA as Context (Environment) Sensitive System

Olubadeji Bukola, Adetunmbi A.O, Alese B.K.
2015 International Journal of Computer Applications  
Existing immune-inspired techniques have not performed as well as expected when applied to the detection of intruders in computer systems.  ...  of "signals" which provide the immune system with a sense of context.  ...  INTRODUCTION The Dendritic Cell Algorithm (DCA) is an emerging algorithm within the field of artificial immune systems (AIS) [7] .  ... 
doi:10.5120/ijca2015907236 fatcat:kltz4ksjozdctnioyiirpnz5gy

Recent Advances in Artificial Immune Systems: Models and Applications

Dipankar Dasgupta, Senhua Yu, Fernando Nino
2011 Applied Soft Computing  
The immune system is a remarkable information processing and self learning system that offers inspiration to build artificial immune system (AIS).  ...  This survey has revealed that recent research is centered on four major AIS algorithms: (1) negative selection algorithms; (2) artificial immune networks; (3) clonal selection algorithms; (4) Danger Theory  ...  Research work on applied AISs ranges from developing immune-inspired algorithms, building immune-inspired computer systems, to apply AISs to diverse real world applications.  ... 
doi:10.1016/j.asoc.2010.08.024 fatcat:utgvstpp75e27h3whu7kn2voae

The Design and Development of Spam Risk Assessment Prototype: In Silico of Danger Theory Variants

Kamahazira Zainal, Mohd Zalisham
2017 International Journal of Advanced Computer Science and Applications  
A process of information retrieval by applying the text mining with Artificial Immune System (AIS) is proposed to discover the possible level of severity for a Short Messaging Service (SMS) spam.  ...  This is expected to be a potential tool in retrieving an implicit danger that a spam might impact to the recipients.  ...  This theory is well known as Artificial Immune System (AIS) and specifically a theory from Danger Theory and its variants are applied.  ... 
doi:10.14569/ijacsa.2017.080454 fatcat:gc5mhj6xqzhzxpx775fogo2zfu

Immunological Approach for Intrusion Detection

Meriem Zekri, Labiba Souici-Meslati
2014 ARIMA  
In this paper, we propose two artificial immune systems for intrusion detection using the KDD Cup'99 database.  ...  However, the growth and complexity of computer systems or networks to protect require the development of automated and adaptive defensive tools.  ...  The DCs implemented in TLR collect antigen from an antigen store, and process signals.  ... 
doi:10.46298/arima.1974 fatcat:wv434lykgjasrn5pgreyimreg4

Intrusion Detection Technique based on Dendritic Cell Algorithm and Dempster Belief Theory

Kalpana Kumari
2012 IOSR Journal of Computer Engineering  
In this paper we presents a intrusion detection system based on one of the algorithm of artificial immune system called the Dendritic Cell Algorithm (DCA) and Dempster-Belief Theory (DBT) in order to minimise  ...  Recently Artificial immune system (AIS) has been applied for anomaly based intrusion detection in computer networks.  ...  Artificial Immune System is a new bio-inspired model, which is applied for solving various problems in the field of information security, genetic algorithms, neural networks, evolutionary algorithms and  ... 
doi:10.9790/0661-0153843 fatcat:zgidbysefzc7vb6seq2gvwavpa

Securing Relational Databases with an Artificial Immunity Features

Ayman MohamedMostafa, Mohamed H. Abdel-Aziz, Ibrahim M. El-Henawy
2013 International Journal of Computer Applications  
Artificial immune system is the artificial simulation of human immunity that can be applied to computer security applications.  ...  Danger theory is one of the most recent algorithms of artificial immunity that can provide interactive features for securing relational databases.  ...  The main goal of this paper is to open a new trend for applying the field of artificial immune system for securing relational databases.  ... 
doi:10.5120/11566-6861 fatcat:xl3u3oh7ebdzhiljpth6ncl5am

Artificial Dendritic Cells: Multi-faceted Perspectives [article]

Julie Greensmith, Uwe Aickelin
2009 arXiv   pre-print
The chapter is concluded with a discussion of the parallels between our understanding of the human immune system and how such knowledge influences the design of artificial immune systems.  ...  Dendritic cells are the crime scene investigators of the human immune system. Their function is to correlate potentially anomalous invading entities with observed damage to the body.  ...  signals of an artificial DC.  ... 
arXiv:0907.3867v2 fatcat:flecfuvr4fbejmin4r4x4xminu

Sensing danger: Innate immunology for intrusion detection

Uwe Aickelin, Julie Greensmith
2007 Information Security Technical Report  
The resultant algorithms are applied to real world intrusion problems and show encouraging results. Overall, we believe there is a bright future for these next generation artificial immune algorithms.  ...  The immune system provides an ideal metaphor for anomaly detection in general and computer security in particular.  ...  A key requirement to building such immune inspired intrusion detection systems and algorithms had to be an improved understanding of the correlation of signals processed by the DCs of the innate immune  ... 
doi:10.1016/j.istr.2007.10.003 fatcat:253ckefdcvaqffkmmuou7l23ji

Sensing Danger: Innate Immunology for Intrusion Detection

Uwe Aickelin
2007 Social Science Research Network  
The resultant algorithms are applied to real world intrusion problems and show encouraging results. Overall, we believe there is a bright future for these next generation artificial immune algorithms.  ...  The immune system provides an ideal metaphor for anomaly detection in general and computer security in particular.  ...  A key requirement to building such immune inspired intrusion detection systems and algorithms had to be an improved understanding of the correlation of signals processed by the DCs of the innate immune  ... 
doi:10.2139/ssrn.2824153 fatcat:tdwsp3dbebfybbuqzoyblqzvvy

Artificial Dendritic Cells: Multi-Faceted Perspectives

Julie Greensmith, Uwe Aickelin
2009 Social Science Research Network  
The chapter is concluded with a discussion of the parallels between our understanding of the human immune system and how such knowledge influences the design of artificial immune systems.  ...  Dendritic cells are the crime scene investigators of the human immune system. Their function is to correlate potentially anomalous invading entities with observed damage to the body.  ...  signals of an artificial DC.  ... 
doi:10.2139/ssrn.2827957 fatcat:vliiauw7gvaxzjjtlvpxw4cw2a

A Review of Feature Reduction in Intrusion Detection System Based on Artificial Immune System and Neural Network

Uma Vishwakarma, Prof. Anurag Jain, Prof. Akriti Jain
2010 INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY  
Artificial immune system is biological inspired system work as mathematical model for feature reduction process. The neural network well knows optimization technique in other field.  ...  In this paper we discuss its various method of feature reduction using artificial immune system and neural network.  ...  In [2] author uses an Agent-based artificial immune system to apply intrusion detection systems. A multi agent-based IDS inspired by the danger theory of human immune.  ... 
doi:10.24297/ijct.v9i3.3338 fatcat:rz6yvj7g7nds7offjn6kdtusq4

Auto-Immunity Dendritic Cell Algorithm

Olubadeji Bukola, Adetunmbi A.O.
2016 International Journal of Computer Applications  
This paper presents a systematic approach to intrusion detection using artificial immune system (Dendritic Cell) to purging in order to avoid attack subversion and autoimmunity on network.  ...  The Dendritic Cell Algorithm which is based on an abstract model of dendritic cell behaviour, with the abstraction process performed in close collaboration with immunologists will be used.  ...  The data ID is used to form antigen, with a pre-processed subset of attributes used to form the signals.  ... 
doi:10.5120/ijca2016908689 fatcat:3mtylz4sl5audffclbtugt4efi

Detecting Danger: Applying a Novel Immunological Concept to Intrusion Detection Systems

Julie Greensmith, Uwe Aickelin, Jamie Twycross
2004 Social Science Research Network  
It is believed that these signals may facilitate an immune response.  ...  This process however comes from a pre-programmed and highly controlled mechanism, known as apoptosis.  ... 
doi:10.2139/ssrn.2832029 fatcat:exntb6m5yfgyxgxlt4oo5ireoi

An Immunological-Based Simulation: A Case Study of Risk Concentration for Mobile Spam Context Assessment

Kamahazira Zainal, Mohd Zalisham Jali
2018 International Journal on Advanced Science, Engineering and Information Technology  
Danger Theory, a prominent theory from Artificial Immune Systems (AIS), inspires the developed model.  ...  This simulation demonstrated that the Danger Theory as a feasible model to be applied in measuring the risk of spam.  ...  Theory inspired by this human body immunology and developed artificially, or Artificial Immune Systems (AIS) is the designation of signified signal processing and selfadapting system.  ... 
doi:10.18517/ijaseit.8.3.2719 fatcat:llk74visqvb6be6vzetmkz2qey
« Previous Showing results 1 — 15 out of 19,292 results