Immunity-based systems: A survey

被引:0
作者
Dasgupta, D
AttohOkine, N
机构
来源
SMC '97 CONFERENCE PROCEEDINGS - 1997 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS, VOLS 1-5: CONFERENCE THEME: COMPUTATIONAL CYBERNETICS AND SIMULATION | 1997年
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Biological systems such as human beings can be regarded as sophisticated information processing systems, and can be expected to provide inspiration for various ideas to science and engineering. Biologically-motivated information processing systems can be classified into: brain-nervous systems (neural networks), genetic systems (evolutionary algorithms), and immune systems (artificial immune systems). Among these, nervous systems and genetic systems have been widely applied to various fields. There have been a relative few applications of the immune system. This paper presents a survey of artificial immune systems and provides numerous insights of immunity-based systems applications in science and engineering.
引用
收藏
页码:369 / 374
页数:6
相关论文
共 50 条
[31]   The Ethics of COVID-19 Immunity-Based Licenses ("Immunity Passports") [J].
Persad, Govind ;
Emanuel, Ezekiel J. .
JAMA-JOURNAL OF THE AMERICAN MEDICAL ASSOCIATION, 2020, 323 (22) :2241-2242
[32]   Mechanism for generating immunity-based agents that detect masqueraders [J].
Okamoto, T ;
Watanabe, T ;
Ishida, Y .
KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, PT 2, PROCEEDINGS, 2004, 3214 :534-540
[33]   An immunity-based model for dynamic distributed intrusion detection [J].
Qiao, Peili ;
Wang, Tong ;
Su, Jie .
DATA MINING, INTRUSION DETECTION, INFORMATION ASSURANCE, AND DATA NETWORKS SECURITY 2008, 2008, 6973
[34]   Vulnerability analysis of immunity-based intrusion detection systems using genetic and evolutionary hackers [J].
Dozier, Gerry ;
Brown, Douglas ;
Hou, Haiyu ;
Hurley, John .
APPLIED SOFT COMPUTING, 2007, 7 (02) :547-553
[35]   Immunity-based Method for Anti-Spam Model [J].
Yang, Jin ;
Liu, Yi ;
Li, Qin .
NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 1, PROCEEDINGS, 2009, :171-174
[36]   An immunity-based technique to characterize intrusions in computer networks [J].
Dasgupta, D ;
González, F .
IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION, 2002, 6 (03) :281-291
[37]   An immunity-based security layer against Internet antigens [J].
Gu, J ;
Lee, D ;
Sim, K ;
Park, S .
IEICE TRANSACTIONS ON COMMUNICATIONS, 2000, E83B (11) :2570-2575
[38]   A dynamic immunity-based model for computer virus detection [J].
Zhang, Yu ;
Li, Tao ;
Qin, Renchao .
2008 INTERNATIONAL SYMPOSIUM ON INFORMATION PROCESSING AND 2008 INTERNATIONAL PACIFIC WORKSHOP ON WEB MINING AND WEB-BASED APPLICATION, 2008, :515-519
[39]   An immunity-based distributed multiarvent-control framework [J].
Lau, HYK ;
Wong, VWK .
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART A-SYSTEMS AND HUMANS, 2006, 36 (01) :91-108
[40]   Artificial immunity-based feature extraction for spam detection [J].
Sirisanyalak, Burim ;
Sornil, Ohm .
SNPD 2007: EIGHTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, VOL 3, PROCEEDINGS, 2007, :359-+