Author:
Hu Xinlei,Wang Zhengxia,Hu Yunbing
Reference14 articles.
1. Dozier, G., Brown, D., Hou, H., et al.: Vulnerability analysis of immunity-based intrusion detection systems using genetic and evolutionary hackers. Appl. Soft Comput. 7, 547–553 (2007)
2. Jerne, N.K.: Towards a network theory of the immune system. Ann. Immunol. (Paris) 373–389 (1974)
3. De Castro, L.N., Timmis, J.: An artificial immune network for multimodal function optimisation. In: Proceedings of IEEE World Congress on Evolutionary Computation, pp. 669–674 (2002)
4. Yue, X., Mo, H.W., Chi, Z.X.: Immune-inspired incremental feature selection technology to data stream. Appl. Soft Comput. 8(2), 1041–1049 (2008)
5. Nasraoui, O., Gonzalez, F., Cardona, C., et al.: A scalable artificial immune system model fordynamic unsupervised learning. In: Proceedings of International Conference on Genetic and Evolutionary Computation, vol. 2723, pp. 219–230. Morgan Kaufmann, San Francisco (2003)