Immunity-based systems: A survey

被引:0
作者
Dasgupta, D
AttohOkine, N
机构
来源
SMC '97 CONFERENCE PROCEEDINGS - 1997 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS, VOLS 1-5: CONFERENCE THEME: COMPUTATIONAL CYBERNETICS AND SIMULATION | 1997年
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Biological systems such as human beings can be regarded as sophisticated information processing systems, and can be expected to provide inspiration for various ideas to science and engineering. Biologically-motivated information processing systems can be classified into: brain-nervous systems (neural networks), genetic systems (evolutionary algorithms), and immune systems (artificial immune systems). Among these, nervous systems and genetic systems have been widely applied to various fields. There have been a relative few applications of the immune system. This paper presents a survey of artificial immune systems and provides numerous insights of immunity-based systems applications in science and engineering.
引用
收藏
页码:369 / 374
页数:6
相关论文
共 50 条
[41]   Artificial immunity-based feature extraction for spam detection [J].
Sirisanyalak, Burim ;
Sornil, Ohm .
SNPD 2007: EIGHTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, VOL 3, PROCEEDINGS, 2007, :359-+
[42]   An Immunity-Based Anomaly Detection System with Sensor Agents [J].
Okamoto, Takeshi ;
Ishida, Yoshiteru .
SENSORS, 2009, 9 (11) :9175-9195
[43]   A dynamic immunity-based model for computer virus detection [J].
Zhang, Yu ;
Li, Tao ;
Qin, Renchao .
2008 INTERNATIONAL SYMPOSIUM ON INFORMATION PROCESSING AND 2008 INTERNATIONAL PACIFIC WORKSHOP ON WEB MINING AND WEB-BASED APPLICATION, 2008, :500-504
[44]   An immunity-based dynamic multilayer intrusion detection system [J].
Liang, Gang ;
Li, Tao ;
Ni, Jiancheng ;
Jiang, Yaping ;
Yang, Jin ;
Gong, Xun .
COMPUTATIONAL INTELLIGENCE AND BIOINFORMATICS, PT 3, PROCEEDINGS, 2006, 4115 :641-650
[45]   An intelligent immunity-based model for distributed intrusion detection [J].
Peng, Zhihao ;
Li, Guanyu .
Journal of Computational Information Systems, 2012, 8 (24) :10123-10130
[46]   Trained immunity-based vaccines for infections and allergic diseases [J].
Martin-Cruz, Leticia ;
Benito-Villalvilla, Cristina ;
Angelina, Alba ;
Subiza, Jose Luis ;
Palomares, Oscar .
JOURNAL OF ALLERGY AND CLINICAL IMMUNOLOGY, 2024, 154 (05) :1085-1094
[47]   A study of immunity-based urban system: A morphological approach [J].
Chen, Chih-Hung ;
Hsu, Lin-Fang .
KNOWLEDGE-BASED AND INTELLIGENT INFORMATION & ENGINEERING SYSTEMS 19TH ANNUAL CONFERENCE, KES-2015, 2015, 60 :652-661
[48]   Performance evaluation of immunity-based diagnosis on complex networks [J].
Watanabe, Yuji ;
Ishida, Yoshiteru .
KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS: KES 2007 - WIRN 2007, PT III, PROCEEDINGS, 2007, 4694 :846-+
[49]   An Improved Immunity-based Trigger for Intrusion Tolerance System [J].
Huang, Guangqiu ;
Wang, Chunzi .
SEVENTH WUHAN INTERNATIONAL CONFERENCE ON E-BUSINESS, VOLS I-III, 2008, :279-285
[50]   A new immunity-based model for network intrusion detection [J].
Li, RF ;
Wang, C ;
Tu, XY .
2005 IEEE NETWORKING, SENSING AND CONTROL PROCEEDINGS, 2005, :106-109