• Reference Citation Analysis
  • v
  • v
  • Find an Article
Find an Article PDF (4613498)   Today's Articles (2049)   Subscriber (49388)
For: Greensmith J, Aickelin U, Cayzer S. Introducing Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomaly Detection. Lecture Notes in Computer Science 2005. [DOI: 10.1007/11536444_12] [Citation(s) in RCA: 157] [Impact Index Per Article: 8.3] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 12/03/2022]
Number Cited by Other Article(s)
1
Rajwar K, Deep K, Das S. An exhaustive review of the metaheuristic algorithms for search and optimization: taxonomy, applications, and open challenges. Artif Intell Rev 2023;56:1-71. [PMID: 37362893 PMCID: PMC10103682 DOI: 10.1007/s10462-023-10470-y] [Citation(s) in RCA: 5] [Impact Index Per Article: 5.0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 06/28/2023]
2
Yu H, Shi J, Qian J, Wang S, Li S. Single dendritic neural classification with an effective spherical search-based whale learning algorithm. MATHEMATICAL BIOSCIENCES AND ENGINEERING : MBE 2023;20:7594-7632. [PMID: 37161164 DOI: 10.3934/mbe.2023328] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 05/11/2023]
3
Widhalm  D, Goeschka  KM, Kastner  W. A Review on Immune-Inspired Node Fault Detection in Wireless Sensor Networks with a Focus on the Danger Theory. SENSORS (BASEL, SWITZERLAND) 2023;23:1166. [PMID: 36772205 PMCID: PMC9920811 DOI: 10.3390/s23031166] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 12/20/2022] [Revised: 01/09/2023] [Accepted: 01/17/2023] [Indexed: 06/18/2023]
4
Ming Z, Liang Y, Zhou W. NDAMM: a numerical differentiation-based artificial macrophage model for anomaly detection. APPL INTELL 2022. [DOI: 10.1007/s10489-022-04334-1] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 12/05/2022]
5
Wang D, Liang Y, Dong H, Tan C, Xiao Z, Liu S. Innate immune memory and its application to artificial immune systems. THE JOURNAL OF SUPERCOMPUTING 2022;78:11680-11701. [PMID: 35194317 PMCID: PMC8852961 DOI: 10.1007/s11227-021-04295-1] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Accepted: 12/29/2021] [Indexed: 06/14/2023]
6
Zhou W, Liang Y. An immune optimization based deterministic dendritic cell algorithm. APPL INTELL 2022. [DOI: 10.1007/s10489-020-02098-0] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/28/2022]
7
Limon-Cantu D, Alarcon-Aquino V. Multiresolution dendritic cell algorithm for network anomaly detection. PeerJ Comput Sci 2021;7:e749. [PMID: 34805504 PMCID: PMC8576553 DOI: 10.7717/peerj-cs.749] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 07/08/2021] [Accepted: 09/27/2021] [Indexed: 06/13/2023]
8
Ezugwu AE, Shukla AK, Nath R, Akinyelu AA, Agushaka JO, Chiroma H, Muhuri PK. Metaheuristics: a comprehensive overview and classification along with bibliometric analysis. Artif Intell Rev 2021. [DOI: 10.1007/s10462-020-09952-0] [Citation(s) in RCA: 29] [Impact Index Per Article: 9.7] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/30/2022]
9
Berquedich M, Berquedich A, Kamach O, Masmoudi M, Chebbak A, Deshayes L. Developing a Mobile COVID-19 Prototype Management Application Integrated With an Electronic Health Record for Effective Management in Hospitals. IEEE ENGINEERING MANAGEMENT REVIEW 2020;48:55-64. [PMCID: PMC8768976 DOI: 10.1109/emr.2020.3032943] [Citation(s) in RCA: 3] [Impact Index Per Article: 0.8] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 10/08/2020] [Accepted: 10/12/2020] [Indexed: 12/02/2023]
10
Molina D, Poyatos J, Ser JD, García S, Hussain A, Herrera F. Comprehensive Taxonomies of Nature- and Bio-inspired Optimization: Inspiration Versus Algorithmic Behavior, Critical Analysis Recommendations. Cognit Comput 2020. [DOI: 10.1007/s12559-020-09730-8] [Citation(s) in RCA: 68] [Impact Index Per Article: 17.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/30/2022]
11
Juneja K. MPMFFT based DCA-DBT integrated probabilistic model for face expression classification. JOURNAL OF KING SAUD UNIVERSITY - COMPUTER AND INFORMATION SCIENCES 2020. [DOI: 10.1016/j.jksuci.2017.10.006] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/29/2022]
12
An extensive review of computational intelligence-based optimization algorithms: trends and applications. Soft comput 2020. [DOI: 10.1007/s00500-020-04958-w] [Citation(s) in RCA: 11] [Impact Index Per Article: 2.8] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/27/2022]
13
Nature Inspired Metaheuristics and Their Applications in Agriculture: A Short Review. PROGRESS IN ARTIFICIAL INTELLIGENCE 2019. [DOI: 10.1007/978-3-030-30241-2_15] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.4] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/25/2022]
14
Survey on evolutionary computation methods for cybersecurity of mobile ad hoc networks. EVOLUTIONARY INTELLIGENCE 2018. [DOI: 10.1007/s12065-018-0154-4] [Citation(s) in RCA: 11] [Impact Index Per Article: 1.8] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/16/2022]
15
Dendritic Cell Algorithm Applied to Ping Scan Investigation Revisited: Detection Quality and Performance Analysis. IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTATIONAL INTELLIGENCE 2017. [DOI: 10.1109/tetci.2017.2721449] [Citation(s) in RCA: 3] [Impact Index Per Article: 0.4] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/06/2022]
16
Lasisi A, Ghazali R, Deris MM, Herawan T, Lasisi F. Extracting Information in Agricultural Data Using Fuzzy-Rough Sets Hybridization and Clonal Selection Theory Inspired Algorithms. INT J PATTERN RECOGN 2016. [DOI: 10.1142/s0218001416600089] [Citation(s) in RCA: 6] [Impact Index Per Article: 0.8] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/18/2022]
17
An upper and lower CUSUM for signal normalization in the dendritic cell algorithm. EVOLUTIONARY INTELLIGENCE 2016. [DOI: 10.1007/s12065-016-0136-3] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/21/2022]
18
A survey of the dendritic cell algorithm. Knowl Inf Syst 2015. [DOI: 10.1007/s10115-015-0891-y] [Citation(s) in RCA: 32] [Impact Index Per Article: 3.6] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/29/2022]
19
A survey of artificial immune system based intrusion detection. ScientificWorldJournal 2014;2014:156790. [PMID: 24790549 PMCID: PMC3981469 DOI: 10.1155/2014/156790] [Citation(s) in RCA: 23] [Impact Index Per Article: 2.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 11/28/2013] [Accepted: 12/30/2013] [Indexed: 11/17/2022]  Open
20
Elsayed SAM, Rajasekaran S, Ammar RA. Integrating Clonal Selection and Deterministic Sampling for Efficient Associative Classification. PROCEEDINGS OF THE ... CONGRESS ON EVOLUTIONARY COMPUTATION. CONGRESS ON EVOLUTIONARY COMPUTATION 2014:3236-3243. [PMID: 24500504 DOI: 10.1109/cec.2013.6557966] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/07/2022]
21
Boussaïd I, Lepagnot J, Siarry P. A survey on optimization metaheuristics. Inf Sci (N Y) 2013. [DOI: 10.1016/j.ins.2013.02.041] [Citation(s) in RCA: 966] [Impact Index Per Article: 87.8] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/24/2022]
22
Algorithms in nature: the convergence of systems biology and computational thinking. Mol Syst Biol 2011;7:546. [PMID: 22068329 PMCID: PMC3261700 DOI: 10.1038/msb.2011.78] [Citation(s) in RCA: 73] [Impact Index Per Article: 5.6] [Reference Citation Analysis] [Abstract] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 05/17/2011] [Accepted: 09/07/2011] [Indexed: 01/30/2023]  Open
23
A Survey of artificial immune applications. Artif Intell Rev 2010. [DOI: 10.1007/s10462-010-9159-9] [Citation(s) in RCA: 26] [Impact Index Per Article: 1.9] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/19/2022]
24
Zhang C, Yi Z. A danger theory inspired artificial immune algorithm for on-line supervised two-class classification problem. Neurocomputing 2010. [DOI: 10.1016/j.neucom.2010.01.005] [Citation(s) in RCA: 20] [Impact Index Per Article: 1.4] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/29/2022]
25
A parallel immune optimization algorithm for numeric function optimization. EVOLUTIONARY INTELLIGENCE 2008. [DOI: 10.1007/s12065-008-0014-8] [Citation(s) in RCA: 4] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/21/2022]
26
The Deterministic Dendritic Cell Algorithm. LECTURE NOTES IN COMPUTER SCIENCE 2008. [DOI: 10.1007/978-3-540-85072-4_26] [Citation(s) in RCA: 72] [Impact Index Per Article: 4.5] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 01/02/2023]
27
Guzella T, Mota-Santos T, Uchôa J, Caminhas W. Identification of SPAM messages using an approach inspired on the immune system. Biosystems 2008;92:215-25. [DOI: 10.1016/j.biosystems.2008.02.006] [Citation(s) in RCA: 18] [Impact Index Per Article: 1.1] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 07/08/2007] [Revised: 02/23/2008] [Accepted: 02/23/2008] [Indexed: 11/28/2022]
28
The DCA: SOMe comparison. EVOLUTIONARY INTELLIGENCE 2008. [DOI: 10.1007/s12065-008-0008-6] [Citation(s) in RCA: 9] [Impact Index Per Article: 0.6] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/22/2022]
29
Improving the reliability of real-time embedded systems using innate immune techniques. EVOLUTIONARY INTELLIGENCE 2008. [DOI: 10.1007/s12065-008-0009-5] [Citation(s) in RCA: 8] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/26/2022]
30
Oates R, Kendall G, Garibaldi JM. Frequency analysis for dendritic cell population tuning. EVOLUTIONARY INTELLIGENCE 2008. [DOI: 10.1007/s12065-008-0011-y] [Citation(s) in RCA: 6] [Impact Index Per Article: 0.4] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/22/2022]
31
An interdisciplinary perspective on artificial immune systems. EVOLUTIONARY INTELLIGENCE 2008. [DOI: 10.1007/s12065-007-0004-2] [Citation(s) in RCA: 63] [Impact Index Per Article: 3.9] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/26/2022]
32
Aickelin U, Greensmith J. Sensing danger: Innate immunology for intrusion detection. ACTA ACUST UNITED AC 2007. [DOI: 10.1016/j.istr.2007.10.003] [Citation(s) in RCA: 27] [Impact Index Per Article: 1.6] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/29/2022]
33
Guzella TS, Mota-Santos TA, Caminhas WM. A Novel Immune Inspired Approach to Fault Detection. LECTURE NOTES IN COMPUTER SCIENCE 2007. [DOI: 10.1007/978-3-540-73922-7_10] [Citation(s) in RCA: 3] [Impact Index Per Article: 0.2] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 12/01/2022]
34
Greensmith J, Aickelin U, Twycross J. Articulation and Clarification of the Dendritic Cell Algorithm. LECTURE NOTES IN COMPUTER SCIENCE 2006. [DOI: 10.1007/11823940_31] [Citation(s) in RCA: 67] [Impact Index Per Article: 3.7] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 01/06/2023]
35
Danger Is Ubiquitous: Detecting Malicious Activities in Sensor Networks Using the Dendritic Cell Algorithm. LECTURE NOTES IN COMPUTER SCIENCE 2006. [DOI: 10.1007/11823940_30] [Citation(s) in RCA: 33] [Impact Index Per Article: 1.8] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 01/15/2023]
36
Kim J, Wilson WO, Aickelin U, McLeod J. Cooperative Automated Worm Response and Detection ImmuNe ALgorithm(CARDINAL) Inspired by T-Cell Immunity and Tolerance. ACTA ACUST UNITED AC 2005. [DOI: 10.1007/11536444_13] [Citation(s) in RCA: 4] [Impact Index Per Article: 0.2] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 02/16/2023]
PrevPage 1 of 1 1Next
© 2004-2024 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA