Author:
Ostaszewski Marek,Seredynski Franciszek,Bouvry Pascal
Publisher
Springer Science and Business Media LLC
Subject
Applied Mathematics,Modelling and Simulation
Reference19 articles.
1. Axelsson, S.: Visualising intrusions: watching the webserver. In: Proceedings of the 19th International Information Security Conference (2004)
2. Beasley, D., Bull, D.R., Martin, R.R.: A sequential niche technique for multimodal function optimization. Evol. Comput. 2(1), 101–125 (1993)
3. Cayzer, S., Smith, J., Marshall, J., Kovacs, T.: What have gene libraries done for AIS? In: Proceedings of the 4th International Conference on Artificial Immune Systems (2005)
4. Dasgupta, D., González, F.: An immunity-based technique to characterize intrusions in computer networks. IEEE Trans. Evol. Comput. 6(3), 1081–1088 (2002)
5. Dozier, G.V., Brown, D., Hurley, J., Cain, K.: Vulnerability analysis of AIS-based intrusion detection systems via genetic and particle swarm red teams. In: Proceedings of the 2004 IEEE Congress on Evolutionary Computation (2004)
Cited by
17 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. De-Psa: Learning from Unlabeled Data by Dual-Stage Label Propagation for Positive Selection Algorithm;2024
2. Adversarial Evolutionary Learning with Distributed Spatial Coevolution;Handbook of Evolutionary Machine Learning;2023-11-02
3. Biological Metaphor for Cyber Immunity;2023 XXVI International Conference on Soft Computing and Measurements (SCM);2023-05-24
4. Negative selection in anomaly detection—A survey;Computer Science Review;2023-05
5. CyberEvo;Proceedings of the Genetic and Evolutionary Computation Conference Companion;2022-07-09