Citation: | WANG Tianbo, ZHANG Fengbin, XIA Chunhe, “Research on Loophole with Second Distribution of Real Value Detectors,” Chinese Journal of Electronics, vol. 25, no. 6, pp. 1141-1150, 2016, doi: 10.1049/cje.2016.08.004 |
E. Hart and J. Timmis, "Application areas of AIS: The past, the present and the future", Applied Soft Computing, Vol.8, pp.191-201, 2008.
|
D.F. Yap, S. Koh, S. Tiong and S. Prajindra, "A hybrid artificial immune systems for multimodal function optimization and its application in engineering problem", Artificial Intelligence Review, Vol.38, pp.291-301, 2012.
|
S. Forrest, A.S. Perelson, L. Allen and R. Cherukuri, "Selfnonself discrimination in a computer", Proc. of IEEE Computer Society Symposium on Research in Security and Privacy, Oakland, USA, pp.202-212, 1994.
|
Z. Ji and D. Dasgupta, "V-detector: An efficient negative selection algorithm with ‘probably adequate’ detector coverage", Information sciences, Vol.179, pp.1390-1406, 2009.
|
M. Majd, F. Shoeleh, A. Hamzeh and S. Hashemi, Simulated Evolution and Learning, Springer, Berlin, Germany, pp.45-54, 2010.
|
J. Textor, Parallel Problem Solving from Nature-PPSN XII, Springer, Berlin, Germany, pp.32-41, 2012.
|
A.S.A. Aziz, M. Salama and S. EL-Ola Hanafi, "Detectors generation using genetic algorithm for a negative selection inspired anomaly network intrusion detection system," Proc. of Federated Conference on Computer Science and Information Systems (FedCSIS), Wroclaw, Poland, pp.597-602, 2012.
|
F. Liu, M. Gong, J. Ma, L. Jiao and W. Zhang, "Optimizing detector distribution in V-detector negative selection using a constrained multiobjective immune algorithm", Proc. of 2010 IEEE Congress on Evolutionary Computation (CEC), Barcelona, Spain, pp.1-8, 2010.
|
M. Gong, J. Zhang, J. Ma and L. Jiao, "Short communication: An efficient negative selection algorithm with further training for anomaly detection", Knowledge-Based Systems, Vol.30, pp.185-191, 2012.
|
L. Xi, "Research on dynamic adaptive mechanism of self and detector in immunity-based intrusion detection system", Ph.D. Thesis, Harbin University of Science and Technology, 2012. (in Chinese)
|
H. Du, M. Gong, R. Liu and L. Jiao, "Adaptive chaos clonal evolutionary programming algorithm", Science in China Series E: Information Sciences, Vol.35, pp.817-829, 2005.
|
R. Zhang, T. Li, and X. Xiao, "A Real-Valued Negative Selection Algorithm Based on Grid for Anomaly Detection", Abstract and Applied Analysis, 2013, pp.1-15.
|
A. Asuncion and D. Newman, "UCI Datasets", http://archive.ics.uci.edu/ml/datasets.html,2007.
|
A. Asuncion and D. Newman, "KDD CUP99 Dataset", http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html,2007.
|
F.A. González and D. Dasgupta, "Anomaly Detection Using Real-Valued Negative Selection", Genetic Programming and Evolvable Machines, Vol.4, pp.383-403, 2003.
|