A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
An Artificial Immune Algorithms Apply to Pre-processing Signals
[chapter]
2004
Lecture Notes in Computer Science
This paper presents the theory of an immune network model, and it tries to apply to solve signal classification problems. ...
The more notable developments have been the neural networks inspired by the working of the brain, and the evolutionary algorithms inspired by neo-Darwinian theory of evolution. ...
An Artificial Immune Network for Signal Analysis Main goal our system is classification signals so there are some problems that have to solve. ...
doi:10.1007/978-3-540-24687-9_107
fatcat:awcsigbih5d7rmsnofso2ybthe
DCA as Context (Environment) Sensitive System
2015
International Journal of Computer Applications
Existing immune-inspired techniques have not performed as well as expected when applied to the detection of intruders in computer systems. ...
of "signals" which provide the immune system with a sense of context. ...
INTRODUCTION The Dendritic Cell Algorithm (DCA) is an emerging algorithm within the field of artificial immune systems (AIS) [7] . ...
doi:10.5120/ijca2015907236
fatcat:kltz4ksjozdctnioyiirpnz5gy
Recent Advances in Artificial Immune Systems: Models and Applications
2011
Applied Soft Computing
The immune system is a remarkable information processing and self learning system that offers inspiration to build artificial immune system (AIS). ...
This survey has revealed that recent research is centered on four major AIS algorithms: (1) negative selection algorithms; (2) artificial immune networks; (3) clonal selection algorithms; (4) Danger Theory ...
Research work on applied AISs ranges from developing immune-inspired algorithms, building immune-inspired computer systems, to apply AISs to diverse real world applications. ...
doi:10.1016/j.asoc.2010.08.024
fatcat:utgvstpp75e27h3whu7kn2voae
The Design and Development of Spam Risk Assessment Prototype: In Silico of Danger Theory Variants
2017
International Journal of Advanced Computer Science and Applications
A process of information retrieval by applying the text mining with Artificial Immune System (AIS) is proposed to discover the possible level of severity for a Short Messaging Service (SMS) spam. ...
This is expected to be a potential tool in retrieving an implicit danger that a spam might impact to the recipients. ...
This theory is well known as Artificial Immune System (AIS) and specifically a theory from Danger Theory and its variants are applied. ...
doi:10.14569/ijacsa.2017.080454
fatcat:gc5mhj6xqzhzxpx775fogo2zfu
Immunological Approach for Intrusion Detection
2014
ARIMA
In this paper, we propose two artificial immune systems for intrusion detection using the KDD Cup'99 database. ...
However, the growth and complexity of computer systems or networks to protect require the development of automated and adaptive defensive tools. ...
The DCs implemented in TLR collect antigen from an antigen store, and process signals. ...
doi:10.46298/arima.1974
fatcat:wv434lykgjasrn5pgreyimreg4
Intrusion Detection Technique based on Dendritic Cell Algorithm and Dempster Belief Theory
2012
IOSR Journal of Computer Engineering
In this paper we presents a intrusion detection system based on one of the algorithm of artificial immune system called the Dendritic Cell Algorithm (DCA) and Dempster-Belief Theory (DBT) in order to minimise ...
Recently Artificial immune system (AIS) has been applied for anomaly based intrusion detection in computer networks. ...
Artificial Immune System is a new bio-inspired model, which is applied for solving various problems in the field of information security, genetic algorithms, neural networks, evolutionary algorithms and ...
doi:10.9790/0661-0153843
fatcat:zgidbysefzc7vb6seq2gvwavpa
Securing Relational Databases with an Artificial Immunity Features
2013
International Journal of Computer Applications
Artificial immune system is the artificial simulation of human immunity that can be applied to computer security applications. ...
Danger theory is one of the most recent algorithms of artificial immunity that can provide interactive features for securing relational databases. ...
The main goal of this paper is to open a new trend for applying the field of artificial immune system for securing relational databases. ...
doi:10.5120/11566-6861
fatcat:xl3u3oh7ebdzhiljpth6ncl5am
Artificial Dendritic Cells: Multi-faceted Perspectives
[article]
2009
arXiv
pre-print
The chapter is concluded with a discussion of the parallels between our understanding of the human immune system and how such knowledge influences the design of artificial immune systems. ...
Dendritic cells are the crime scene investigators of the human immune system. Their function is to correlate potentially anomalous invading entities with observed damage to the body. ...
signals of an artificial DC. ...
arXiv:0907.3867v2
fatcat:flecfuvr4fbejmin4r4x4xminu
Sensing danger: Innate immunology for intrusion detection
2007
Information Security Technical Report
The resultant algorithms are applied to real world intrusion problems and show encouraging results. Overall, we believe there is a bright future for these next generation artificial immune algorithms. ...
The immune system provides an ideal metaphor for anomaly detection in general and computer security in particular. ...
A key requirement to building such immune inspired intrusion detection systems and algorithms had to be an improved understanding of the correlation of signals processed by the DCs of the innate immune ...
doi:10.1016/j.istr.2007.10.003
fatcat:253ckefdcvaqffkmmuou7l23ji
Sensing Danger: Innate Immunology for Intrusion Detection
2007
Social Science Research Network
The resultant algorithms are applied to real world intrusion problems and show encouraging results. Overall, we believe there is a bright future for these next generation artificial immune algorithms. ...
The immune system provides an ideal metaphor for anomaly detection in general and computer security in particular. ...
A key requirement to building such immune inspired intrusion detection systems and algorithms had to be an improved understanding of the correlation of signals processed by the DCs of the innate immune ...
doi:10.2139/ssrn.2824153
fatcat:tdwsp3dbebfybbuqzoyblqzvvy
Artificial Dendritic Cells: Multi-Faceted Perspectives
2009
Social Science Research Network
The chapter is concluded with a discussion of the parallels between our understanding of the human immune system and how such knowledge influences the design of artificial immune systems. ...
Dendritic cells are the crime scene investigators of the human immune system. Their function is to correlate potentially anomalous invading entities with observed damage to the body. ...
signals of an artificial DC. ...
doi:10.2139/ssrn.2827957
fatcat:vliiauw7gvaxzjjtlvpxw4cw2a
A Review of Feature Reduction in Intrusion Detection System Based on Artificial Immune System and Neural Network
2010
INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY
Artificial immune system is biological inspired system work as mathematical model for feature reduction process. The neural network well knows optimization technique in other field. ...
In this paper we discuss its various method of feature reduction using artificial immune system and neural network. ...
In [2] author uses an Agent-based artificial immune system to apply intrusion detection systems. A multi agent-based IDS inspired by the danger theory of human immune. ...
doi:10.24297/ijct.v9i3.3338
fatcat:rz6yvj7g7nds7offjn6kdtusq4
Auto-Immunity Dendritic Cell Algorithm
2016
International Journal of Computer Applications
This paper presents a systematic approach to intrusion detection using artificial immune system (Dendritic Cell) to purging in order to avoid attack subversion and autoimmunity on network. ...
The Dendritic Cell Algorithm which is based on an abstract model of dendritic cell behaviour, with the abstraction process performed in close collaboration with immunologists will be used. ...
The data ID is used to form antigen, with a pre-processed subset of attributes used to form the signals. ...
doi:10.5120/ijca2016908689
fatcat:3mtylz4sl5audffclbtugt4efi
Detecting Danger: Applying a Novel Immunological Concept to Intrusion Detection Systems
2004
Social Science Research Network
It is believed that these signals may facilitate an immune response. ...
This process however comes from a pre-programmed and highly controlled mechanism, known as apoptosis. ...
doi:10.2139/ssrn.2832029
fatcat:exntb6m5yfgyxgxlt4oo5ireoi
An Immunological-Based Simulation: A Case Study of Risk Concentration for Mobile Spam Context Assessment
2018
International Journal on Advanced Science, Engineering and Information Technology
Danger Theory, a prominent theory from Artificial Immune Systems (AIS), inspires the developed model. ...
This simulation demonstrated that the Danger Theory as a feasible model to be applied in measuring the risk of spam. ...
Theory inspired by this human body immunology and developed artificially, or Artificial Immune Systems (AIS) is the designation of signified signal processing and selfadapting system. ...
doi:10.18517/ijaseit.8.3.2719
fatcat:llk74visqvb6be6vzetmkz2qey
« Previous
Showing results 1 — 15 out of 19,292 results