11,262 Hits in 5.7 sec

Next Challenges in Bringing Artificial Immune Systems to Production in Network Security [article]

Michael Hilker
2008 arXiv   pre-print
The human immune system protects the human body against various pathogens like e.g. biological viruses and bacteria.  ...  Artificial immune systems reuse the architecture, organization, and workflows of the human immune system for various problems in computer science.  ...  In contrast to the client-server architecture of common used protection systems, the artificial immune systems implement a distributed architecture where lightweighted, mobile, and autonomous working artificial  ... 
arXiv:0805.1786v1 fatcat:jfcixf2b7ra5fhi4jsva3bugja

Performance Analysis of Classification Techniques by using Multi Agent Based Intrusion Detection System

Aumreesh Kumar Saxena, Sitesh Sinha, Piyush Shukla
2018 International Journal of Computer Network and Information Security  
In this paper we have designed Agent based intrusion detection system (ABIDS) where agents will travel between connected client systems from server in a client-server network.  ...  Intrusion detection system (IDS) will support runtime addition of new ability to agents.  ...  The presented artificial immune system -based agent are accomplished of knowledge, selfalteration, stage mobility, sovereignty and association.  ... 
doi:10.5815/ijcnis.2018.03.03 fatcat:j4ui2k5x4ncqjofplrrbjppc5y

SANA - Network Protection through artificial Immunity [article]

Michael Hilker, Christoph Schommer
2008 arXiv   pre-print
It consists of a cooperative architecture, it is motivated by the human immune system, where the components correspond to artificial immune cells that are connected for their collaborative work.  ...  Current network protection systems use a collection of intelligent components - e.g. classifiers or rule-based firewall systems to detect intrusions and anomalies and to secure a network against viruses  ...  adaptive, and the system does not use small entities as artificial cells and more the multi-agent system approach [3] using heavy agents with few mobility, lots of internal information, and lots of knowledge  ... 
arXiv:0805.0849v1 fatcat:74yrwh4mafh7blg32n44cabslm

Distributed security for multi-agent systems – review and applications

H.F. Rashvand, K. Salah, J.M.A. Calero, L. Harn
2010 IET Information Security  
Service agents and distributed multi-agent systems (MAS) shown the potential to help with this move but lack of trust caused by heavily compromised security issues and concerns with the outof-date solutions  ...  Here, we recognize the need for new 'distributed security' solutions, upon an overlay service, to rejuvenate the distributed artificial intelligence upon the secure MAS as a natural solution to pave the  ...  Another multi-agent approach for securing the intrusion detection comes from Ou and Ou for a dangertheory-inspired artificial immune system, MAAIS [29] .  ... 
doi:10.1049/iet-ifs.2010.0041 fatcat:44siypwv5vbornjc4j7nzawyqi

A distributed intelligent maintenance system based on artificial immune approach and multi-agent systems

Luca Fasanotti
2014 2014 12th IEEE International Conference on Industrial Informatics (INDIN)  
The keywords used were "artificial immune systems diagnostic", "artificial immune systems prognostic", "artificial immune systems industrial", "artificial immune systems maintenance", "artificial immune  ...  The second is protection of a mobile agent against malicious servers or agents.  ... 
doi:10.1109/indin.2014.6945613 dblp:conf/indin/Fasanotti14 fatcat:frqio3kckjgkxhae4el6qjwkra

Evolution of Select Epidemiological Modeling and the Rise of Population Sentiment Analysis: A Literature Review and COVID-19 Sentiment Illustration

Talal Daghriri, Michael Proctor, Sarah Matthews
2022 International Journal of Environmental Research and Public Health  
Agent-based model Artificial Intelligence and Hybrid models Epidemiological State models Agent-based model Artificial Intelligence and Hybrid models Agent-based model Artificial Intelligence and Hybrid  ...  Agent-Based and Multiagent Systems Modeling Agent-based and multiagent systems attempt to model individuals (i.e., agents) and influencers of individuals in a simulated community.  ... 
doi:10.3390/ijerph19063230 pmid:35328916 pmcid:PMC8950337 fatcat:bgivxwcfwvecbbtmxdiejder4i

Danger Theory Based Hybrid Intrusion Detection Systems for Cloud Computing

Azuan Ahmad, Bharanidharan Shanmugam, Norbik Bashah Idris, Ganthan Nayarana Samy, Sameer Hasan AlBakri
2013 International Journal of Computer and Communication Engineering  
Index Terms-Cloud computing, intrusion detection system, artificial immune system.  ...  The main engine of SaaSIDS is the hybrid analysis engine where the signature based engine and anomaly based engine which using Artificial Immune System (AIS) will work in parallel.  ...  This component consists of two methods of analysis which are Rule Based Engine and Artificial Immune System Engine.  ... 
doi:10.7763/ijcce.2013.v2.267 fatcat:l2goalawz5cdrjag5mobykidwy

SmartContent: A Self-Protecting and Context-Aware Active Content

Akla-Esso Tchao, Giovanna Di Marzo Serugendo
2012 2012 IEEE Sixth International Conference on Self-Adaptive and Self-Organizing Systems Workshops  
In addition, the ubiquitousness of mobile devices makes it possible to access content anywhere, at anytime on different platforms.  ...  In this paper, we propose SmartContent, a novel approach for content protection and privacy. SmartContent acts autonomously and embeds with the content the notion of context and policy.  ...  The Artificial Immune System (AIS) is an adaptive system inspired by theoretical immunology and observed immune functions and models, aiming at solving problems [3] .  ... 
doi:10.1109/sasow.2012.34 dblp:conf/saso/TchaoS12 fatcat:n7pub6qp6vgvxh3hxxfkrgdx3y

A fluorescent biosensor-based platform for the discovery of immunogenic cancer cell death inducers

Oliver Kepp, Allan Sauvat, Marion Leduc, Sabrina Forveille, Peng Liu, Liwei Zhao, Lucillia Bezu, Wei Xie, Laurence Zitvogel, Guido Kroemer
2019 Oncoimmunology  
Systemic anticancer immunity can be reinstated via the induction of immunogenic cell death (ICD) in malignant cells.  ...  Here we report the design of a discovery pipeline for the identification of novel ICD inducers by means of a phenotypic screening platform.  ...  system (Figure 1 ).  ... 
doi:10.1080/2162402x.2019.1606665 pmid:31413915 pmcid:PMC6682369 fatcat:gzv7j73serc3vhi6dslhak7m6i

Artificial Intelligence Techniques for Cyber Security Applications

Shanqi Pang, Yongmei Li
2020 International journal of advanced information and communication technology  
Human and physical intervention tend not to be very adequate for the protection and tracking of such infrastructure, that is why there should be the establishment of multifaceted cyber defense networks  ...  Nevertheless, significant number of bio-related computing techniques of AI (artificial intelligence) tend to be increasing hence a significant role is played in detecting and preventing cybercrime.  ...  Based on multi-agent systems, a number of mobile autonomous agents link up in a coordinated and intellectual way for solving a number of issues of classes of problems.  ... 
doi:10.46532/ijaict-2020021 fatcat:owrpv5q57jeeza7vz4a6ezyxbu

Immuno-inspired autonomic system for cyber defense

Dipankar Dasgupta
2007 Information Security Technical Report  
The biological immune system is an autonomic system for self-protection, which has evolved over millions of years probably through extensive redesigning, testing, tuning and optimization process.  ...  The powerful information processing capabilities of the immune system, such as feature extraction, pattern recognition, learning, memory, and its distributive nature provide rich metaphors for its artificial  ...  The immune system is a mobile agent system, where the agents circulate at various primary and secondary lymphoid organs of the body to perform immunogenetic functions.  ... 
doi:10.1016/j.istr.2007.10.002 fatcat:mgxdiqr7pbbavn5yd45psrfu44

Immunology-directed methods for distributed robotics: a novel immunity-based architecture for robust control and coordination

Surya P. N. Singh, Scott M. Thayer, Douglas W. Gage, Howie M. Choset
2002 Mobile Robots XVI  
This paper presents a novel algorithmic architecture for the coordination and control of large scale distributed robot teams derived from the constructs found within the human immune system.  ...  This method improves on initial developments in this area by including often overlooked interactions of the innate immune system resulting in a stronger first-order, general response mechanism.  ...  To appreciate the operation and interactions within artificial immune systems, it helps to have a general understanding of the immune system on which the IDARA metaphor is based.  ... 
doi:10.1117/12.457453 dblp:conf/mr/SinghT01 fatcat:cfdptudrwbawng7fl6b3ui24km

Papers by Title

2019 2019 IEEE International Conference on Consumer Electronics - Taiwan (ICCE-TW)  
Video Platform Internet Community Cell Temperature and Reactant Humidification Effects on Anion Exchange Membrane Fuel Cells Channel-& Drift Region's STI-Lengths Impacts of ESD Immunity in HV 60 V nLDMOS  ...  Multi-agent crowdsourcing model based on Q-learning Multi-agent Negotiation in Real-time Bidding Multi-Resident Activity Recognition using Multi-Label Classification in Ambient Sensing Smart Homes  ... 
doi:10.1109/icce-tw46550.2019.8991721 fatcat:62376ymadzge3g5xomicr5tesq

A Survey of Intrusion Detection System

Wanda P
2020 International Journal of Informatics and Computation  
It consists of Web Application, Cloud Environment, Internet of Things (IoT), Mobile Ad-Hoc Network (MANET), Wireless Sensor Network (WSN) and Voice over Internet Protocol (VOIP)  ...  However, security, privacy, and confidentiality of electronic systems are potentially major problems in computer systems.  ...  These approaches can be sorted as statistical based, artificial immune system based, machine learning based, data mining based and game theory based.  ... 
doi:10.35842/ijicom.v1i1.7 fatcat:igdlmx2ctbfdlb7se5fagl2m34


H.Y.K. Lau, A.K.S. Ng
2005 IFAC Proceedings Volumes  
Artificial Immune System (AIS) has recently been actively researched with a number of emerging engineering applications that has capitalized from its characteristics including self-organization, distributive  ...  In this paper, we investigate the viability of a multiagent immunology-based motion control for the trajectory control of modular hyper-redundant manipulators. Copyright©2005 IFAC  ...  The behavioral module is derived according to the artificial immune system.  ... 
doi:10.3182/20050703-6-cz-1902.01297 fatcat:ytzi37taw5eofbg7rloacjcdxy
« Previous Showing results 1 — 15 out of 11,262 results