The Internet Archive has a preservation copy of this work in our general collections.
The file type is application/pdf
.
Filters
Next Challenges in Bringing Artificial Immune Systems to Production in Network Security
[article]
2008
arXiv
pre-print
The human immune system protects the human body against various pathogens like e.g. biological viruses and bacteria. ...
Artificial immune systems reuse the architecture, organization, and workflows of the human immune system for various problems in computer science. ...
In contrast to the client-server architecture of common used protection systems, the artificial immune systems implement a distributed architecture where lightweighted, mobile, and autonomous working artificial ...
arXiv:0805.1786v1
fatcat:jfcixf2b7ra5fhi4jsva3bugja
Performance Analysis of Classification Techniques by using Multi Agent Based Intrusion Detection System
2018
International Journal of Computer Network and Information Security
In this paper we have designed Agent based intrusion detection system (ABIDS) where agents will travel between connected client systems from server in a client-server network. ...
Intrusion detection system (IDS) will support runtime addition of new ability to agents. ...
The presented artificial immune system -based agent are accomplished of knowledge, selfalteration, stage mobility, sovereignty and association. ...
doi:10.5815/ijcnis.2018.03.03
fatcat:j4ui2k5x4ncqjofplrrbjppc5y
SANA - Network Protection through artificial Immunity
[article]
2008
arXiv
pre-print
It consists of a cooperative architecture, it is motivated by the human immune system, where the components correspond to artificial immune cells that are connected for their collaborative work. ...
Current network protection systems use a collection of intelligent components - e.g. classifiers or rule-based firewall systems to detect intrusions and anomalies and to secure a network against viruses ...
adaptive, and the system does not use small entities as artificial cells and more the multi-agent system approach [3] using heavy agents with few mobility, lots of internal information, and lots of knowledge ...
arXiv:0805.0849v1
fatcat:74yrwh4mafh7blg32n44cabslm
Distributed security for multi-agent systems – review and applications
2010
IET Information Security
Service agents and distributed multi-agent systems (MAS) shown the potential to help with this move but lack of trust caused by heavily compromised security issues and concerns with the outof-date solutions ...
Here, we recognize the need for new 'distributed security' solutions, upon an overlay service, to rejuvenate the distributed artificial intelligence upon the secure MAS as a natural solution to pave the ...
Another multi-agent approach for securing the intrusion detection comes from Ou and Ou for a dangertheory-inspired artificial immune system, MAAIS [29] . ...
doi:10.1049/iet-ifs.2010.0041
fatcat:44siypwv5vbornjc4j7nzawyqi
A distributed intelligent maintenance system based on artificial immune approach and multi-agent systems
2014
2014 12th IEEE International Conference on Industrial Informatics (INDIN)
The keywords used were "artificial immune systems diagnostic", "artificial immune systems prognostic", "artificial immune systems industrial", "artificial immune systems maintenance", "artificial immune ...
The second is protection of a mobile agent against malicious servers or agents. ...
doi:10.1109/indin.2014.6945613
dblp:conf/indin/Fasanotti14
fatcat:frqio3kckjgkxhae4el6qjwkra
Evolution of Select Epidemiological Modeling and the Rise of Population Sentiment Analysis: A Literature Review and COVID-19 Sentiment Illustration
2022
International Journal of Environmental Research and Public Health
Agent-based model Artificial Intelligence and Hybrid models Epidemiological State models Agent-based model Artificial Intelligence and Hybrid models Agent-based model Artificial Intelligence and Hybrid ...
Agent-Based and Multiagent Systems Modeling Agent-based and multiagent systems attempt to model individuals (i.e., agents) and influencers of individuals in a simulated community. ...
doi:10.3390/ijerph19063230
pmid:35328916
pmcid:PMC8950337
fatcat:bgivxwcfwvecbbtmxdiejder4i
Danger Theory Based Hybrid Intrusion Detection Systems for Cloud Computing
2013
International Journal of Computer and Communication Engineering
Index Terms-Cloud computing, intrusion detection system, artificial immune system. ...
The main engine of SaaSIDS is the hybrid analysis engine where the signature based engine and anomaly based engine which using Artificial Immune System (AIS) will work in parallel. ...
This component consists of two methods of analysis which are Rule Based Engine and Artificial Immune System Engine. ...
doi:10.7763/ijcce.2013.v2.267
fatcat:l2goalawz5cdrjag5mobykidwy
SmartContent: A Self-Protecting and Context-Aware Active Content
2012
2012 IEEE Sixth International Conference on Self-Adaptive and Self-Organizing Systems Workshops
In addition, the ubiquitousness of mobile devices makes it possible to access content anywhere, at anytime on different platforms. ...
In this paper, we propose SmartContent, a novel approach for content protection and privacy. SmartContent acts autonomously and embeds with the content the notion of context and policy. ...
The Artificial Immune System (AIS) is an adaptive system inspired by theoretical immunology and observed immune functions and models, aiming at solving problems [3] . ...
doi:10.1109/sasow.2012.34
dblp:conf/saso/TchaoS12
fatcat:n7pub6qp6vgvxh3hxxfkrgdx3y
A fluorescent biosensor-based platform for the discovery of immunogenic cancer cell death inducers
2019
Oncoimmunology
Systemic anticancer immunity can be reinstated via the induction of immunogenic cell death (ICD) in malignant cells. ...
Here we report the design of a discovery pipeline for the identification of novel ICD inducers by means of a phenotypic screening platform. ...
system (Figure 1 ). ...
doi:10.1080/2162402x.2019.1606665
pmid:31413915
pmcid:PMC6682369
fatcat:gzv7j73serc3vhi6dslhak7m6i
Artificial Intelligence Techniques for Cyber Security Applications
2020
International journal of advanced information and communication technology
Human and physical intervention tend not to be very adequate for the protection and tracking of such infrastructure, that is why there should be the establishment of multifaceted cyber defense networks ...
Nevertheless, significant number of bio-related computing techniques of AI (artificial intelligence) tend to be increasing hence a significant role is played in detecting and preventing cybercrime. ...
Based on multi-agent systems, a number of mobile autonomous agents link up in a coordinated and intellectual way for solving a number of issues of classes of problems. ...
doi:10.46532/ijaict-2020021
fatcat:owrpv5q57jeeza7vz4a6ezyxbu
Immuno-inspired autonomic system for cyber defense
2007
Information Security Technical Report
The biological immune system is an autonomic system for self-protection, which has evolved over millions of years probably through extensive redesigning, testing, tuning and optimization process. ...
The powerful information processing capabilities of the immune system, such as feature extraction, pattern recognition, learning, memory, and its distributive nature provide rich metaphors for its artificial ...
The immune system is a mobile agent system, where the agents circulate at various primary and secondary lymphoid organs of the body to perform immunogenetic functions. ...
doi:10.1016/j.istr.2007.10.002
fatcat:mgxdiqr7pbbavn5yd45psrfu44
Immunology-directed methods for distributed robotics: a novel immunity-based architecture for robust control and coordination
2002
Mobile Robots XVI
This paper presents a novel algorithmic architecture for the coordination and control of large scale distributed robot teams derived from the constructs found within the human immune system. ...
This method improves on initial developments in this area by including often overlooked interactions of the innate immune system resulting in a stronger first-order, general response mechanism. ...
To appreciate the operation and interactions within artificial immune systems, it helps to have a general understanding of the immune system on which the IDARA metaphor is based. ...
doi:10.1117/12.457453
dblp:conf/mr/SinghT01
fatcat:cfdptudrwbawng7fl6b3ui24km
Papers by Title
2019
2019 IEEE International Conference on Consumer Electronics - Taiwan (ICCE-TW)
Video Platform Internet Community Cell Temperature and Reactant Humidification Effects on Anion Exchange Membrane Fuel Cells
Channel-& Drift Region's STI-Lengths Impacts of ESD Immunity in HV 60 V nLDMOS ...
Multi-agent crowdsourcing model based on Q-learning
Multi-agent Negotiation in Real-time Bidding
Multi-Resident Activity Recognition using Multi-Label Classification in Ambient Sensing Smart Homes ...
doi:10.1109/icce-tw46550.2019.8991721
fatcat:62376ymadzge3g5xomicr5tesq
A Survey of Intrusion Detection System
2020
International Journal of Informatics and Computation
It consists of Web Application, Cloud Environment, Internet of Things (IoT), Mobile Ad-Hoc Network (MANET), Wireless Sensor Network (WSN) and Voice over Internet Protocol (VOIP) ...
However, security, privacy, and confidentiality of electronic systems are potentially major problems in computer systems. ...
These approaches can be sorted as statistical based, artificial immune system based, machine learning based, data mining based and game theory based. ...
doi:10.35842/ijicom.v1i1.7
fatcat:igdlmx2ctbfdlb7se5fagl2m34
IMMUNOLOGY-BASED MOTION CONTROL FOR MODULAR HYPER-REDUNDANT MANIPULATORS
2005
IFAC Proceedings Volumes
Artificial Immune System (AIS) has recently been actively researched with a number of emerging engineering applications that has capitalized from its characteristics including self-organization, distributive ...
In this paper, we investigate the viability of a multiagent immunology-based motion control for the trajectory control of modular hyper-redundant manipulators. Copyright©2005 IFAC ...
The behavioral module is derived according to the artificial immune system. ...
doi:10.3182/20050703-6-cz-1902.01297
fatcat:ytzi37taw5eofbg7rloacjcdxy
« Previous
Showing results 1 — 15 out of 11,262 results