• Reference Citation Analysis
  • v
  • v
  • Find an Article
Find an Article PDF (5070344)   Today's Articles (5)
For: Aickelin U, Bentley P, Cayzer S, Kim J, McLeod J. Danger Theory: The Link between AIS and IDS? Lecture Notes in Computer Science 2003. [DOI: 10.1007/978-3-540-45192-1_15] [Citation(s) in RCA: 149] [Impact Index Per Article: 6.8] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 01/06/2023]
Number Cited by Other Article(s)
1
Zamini M, Hasheminejad SMH. A comprehensive survey of anomaly detection in banking, wireless sensor networks, social networks, and healthcare. INTELLIGENT DECISION TECHNOLOGIES 2019. [DOI: 10.3233/idt-170155] [Citation(s) in RCA: 11] [Impact Index Per Article: 1.8] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/15/2022]
2
SWIM: An Effective Method to Perceive Cyberspace Situation from Honeynet. ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING 2018. [DOI: 10.1007/s13369-017-2904-5] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/27/2022]
3
Srinivasan RS, Tew JD. Supply chain immune system: concept, framework, and applications. INTERNATIONAL JOURNAL OF LOGISTICS-RESEARCH AND APPLICATIONS 2017. [DOI: 10.1080/13675567.2017.1324834] [Citation(s) in RCA: 3] [Impact Index Per Article: 0.4] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/19/2022]
4
Ijaz S, Hashmi FA, Asghar S, Alam M. Vector Based Genetic Algorithm to optimize predictive analysis in network security. APPL INTELL 2017. [DOI: 10.1007/s10489-017-1026-9] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.1] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/19/2022]
5
A novel multi-population coevolution strategy for single objective immune optimization algorithm. Neural Comput Appl 2016. [DOI: 10.1007/s00521-016-2507-1] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.2] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/21/2022]
6
Raza A, Fernandez BR. Immuno-inspired robotic applications: A review. Appl Soft Comput 2015. [DOI: 10.1016/j.asoc.2015.08.050] [Citation(s) in RCA: 12] [Impact Index Per Article: 1.2] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 12/31/2022]
7
A novel multi-population coevolution immune optimization algorithm. Soft comput 2015. [DOI: 10.1007/s00500-015-1724-3] [Citation(s) in RCA: 5] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 01/10/2023]
8
Zhang P, Tan Y. Immune cooperation mechanism based learning framework. Neurocomputing 2015. [DOI: 10.1016/j.neucom.2012.08.076] [Citation(s) in RCA: 4] [Impact Index Per Article: 0.4] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/28/2022]
9
A survey of artificial immune system based intrusion detection. ScientificWorldJournal 2014;2014:156790. [PMID: 24790549 PMCID: PMC3981469 DOI: 10.1155/2014/156790] [Citation(s) in RCA: 23] [Impact Index Per Article: 2.1] [Reference Citation Analysis] [Abstract] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 11/28/2013] [Accepted: 12/30/2013] [Indexed: 11/17/2022]  Open
10
Structural design of the danger model immune algorithm. Inf Sci (N Y) 2012. [DOI: 10.1016/j.ins.2012.04.011] [Citation(s) in RCA: 6] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/20/2022]
11
Pritchard L, Birch P. A systems biology perspective on plant-microbe interactions: biochemical and structural targets of pathogen effectors. PLANT SCIENCE : AN INTERNATIONAL JOURNAL OF EXPERIMENTAL PLANT BIOLOGY 2011;180:584-603. [PMID: 21421407 DOI: 10.1016/j.plantsci.2010.12.008] [Citation(s) in RCA: 32] [Impact Index Per Article: 2.3] [Reference Citation Analysis] [Abstract] [MESH Headings] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 11/01/2010] [Revised: 12/13/2010] [Accepted: 12/15/2010] [Indexed: 05/22/2023]
12
A Survey of artificial immune applications. Artif Intell Rev 2010. [DOI: 10.1007/s10462-010-9159-9] [Citation(s) in RCA: 26] [Impact Index Per Article: 1.7] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/19/2022]
13
Collaborative RFID intrusion detection with an artificial immune system. J Intell Inf Syst 2010. [DOI: 10.1007/s10844-010-0118-3] [Citation(s) in RCA: 6] [Impact Index Per Article: 0.4] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/19/2022]
14
Zhang C, Yi Z. A danger theory inspired artificial immune algorithm for on-line supervised two-class classification problem. Neurocomputing 2010. [DOI: 10.1016/j.neucom.2010.01.005] [Citation(s) in RCA: 20] [Impact Index Per Article: 1.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/29/2022]
15
Greensmith J, Whitbrook A, Aickelin U. Artificial Immune Systems. INTERNATIONAL SERIES IN OPERATIONS RESEARCH & MANAGEMENT SCIENCE 2010. [DOI: 10.1007/978-1-4419-1665-5_14] [Citation(s) in RCA: 31] [Impact Index Per Article: 2.1] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 12/24/2022]
16
The Deterministic Dendritic Cell Algorithm. LECTURE NOTES IN COMPUTER SCIENCE 2008. [DOI: 10.1007/978-3-540-85072-4_26] [Citation(s) in RCA: 72] [Impact Index Per Article: 4.2] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 01/02/2023]
17
The DCA: SOMe comparison. EVOLUTIONARY INTELLIGENCE 2008. [DOI: 10.1007/s12065-008-0008-6] [Citation(s) in RCA: 9] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/22/2022]
18
An interdisciplinary perspective on artificial immune systems. EVOLUTIONARY INTELLIGENCE 2008. [DOI: 10.1007/s12065-007-0004-2] [Citation(s) in RCA: 63] [Impact Index Per Article: 3.7] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/26/2022]
19
Greensmith J, Aickelin U, Twycross J. Articulation and Clarification of the Dendritic Cell Algorithm. LECTURE NOTES IN COMPUTER SCIENCE 2006. [DOI: 10.1007/11823940_31] [Citation(s) in RCA: 67] [Impact Index Per Article: 3.5] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 01/06/2023]
20
Danger Is Ubiquitous: Detecting Malicious Activities in Sensor Networks Using the Dendritic Cell Algorithm. LECTURE NOTES IN COMPUTER SCIENCE 2006. [DOI: 10.1007/11823940_30] [Citation(s) in RCA: 33] [Impact Index Per Article: 1.7] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 01/15/2023]
21
Application Areas of AIS: The Past, The Present and The Future. ACTA ACUST UNITED AC 2005. [DOI: 10.1007/11536444_37] [Citation(s) in RCA: 9] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register]
22
Kim J, Wilson WO, Aickelin U, McLeod J. Cooperative Automated Worm Response and Detection ImmuNe ALgorithm(CARDINAL) Inspired by T-Cell Immunity and Tolerance. ACTA ACUST UNITED AC 2005. [DOI: 10.1007/11536444_13] [Citation(s) in RCA: 4] [Impact Index Per Article: 0.2] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 02/16/2023]
23
Pinto JCL, Von Zuben FJ. Fault Detection Algorithm for Telephone Systems Based on the Danger Theory. LECTURE NOTES IN COMPUTER SCIENCE 2005. [DOI: 10.1007/11536444_32] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.1] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 02/07/2023]
24
Introducing Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomaly Detection. LECTURE NOTES IN COMPUTER SCIENCE 2005. [DOI: 10.1007/11536444_12] [Citation(s) in RCA: 157] [Impact Index Per Article: 7.9] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 12/03/2022]
25
Immune System Approaches to Intrusion Detection – A Review. LECTURE NOTES IN COMPUTER SCIENCE 2004. [DOI: 10.1007/978-3-540-30220-9_26] [Citation(s) in RCA: 59] [Impact Index Per Article: 2.8] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 12/27/2022]
26
An Artificial Immune System for Misbehavior Detection in Mobile Ad-Hoc Networks with Virtual Thymus, Clustering, Danger Signal, and Memory Detectors. LECTURE NOTES IN COMPUTER SCIENCE 2004. [DOI: 10.1007/978-3-540-30220-9_28] [Citation(s) in RCA: 39] [Impact Index Per Article: 1.9] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 01/09/2023]
PrevPage 1 of 1 1Next
© 2004-2025 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA