[1]
|
H.-P. Kriegel, P. Kroger and A. Zimek, “Outlier Detection Techniques (Tutorial),” 13th Pacific-Asia Conference on Knowledge Discovery and Data Mining, Bangkok, 27-30 April 2009.
|
[2]
|
N. Cristianini and S. J. Taylor, “An Introduction to Support Vector Machines,” Cambridge University Press, Cambridge, 2000.
|
[3]
|
J. H. Friedman, “Multivariate Adaptive Regression Splines,” Annals of Statistics, Vol. 19, No. 1, 1991, pp. 1-141.
doi:10.1214/aos/1176347963
|
[4]
|
W. Banzhaf, P. Nordin, E. R. Keller, F. D. Francone, “Genetic Programming: An Introduction on the Automatic Evolution of Computer Programs and Its Applications,” Morgan Kaufmann Publishers, Inc., Waltham, 1998.
|
[5]
|
S. A. Hofmeyr and S. Forrest, “Immunity by Design: An Artificial Immunb System,” Proceedings of the Genetic and Evolutionary Computation Conference, Morgan Kaufmann, San Mateo, 13-17 July 1999, pp. 1289-1296.
|
[6]
|
J. D. Farmer, N. Packard and A. Perelson, “The Immune System, Adaptation and Machine Learning,” Physica D, Vol. 2, No. 1-3, 1986, pp. 187-204.
doi:10.1016/0167-2789(86)90240-X
|
[7]
|
H. Bersini and F. J. Varela, “Hints for Adaptive Problem Solving Gleaned from Immune Networks,” Parallel Problem Solving from Nature, First Workshop PPSW 1, Dortmund, 1-3 October 1990.
|
[8]
|
L. N. de Castro and J. Timmis, “Artificial Immune Systems: A New Computational Intelligence Approach,” Springer, Berlin, 2002.
|
[9]
|
D. Dasgupta, “Immunity-Based Intrusion Detection Systems: A General Framework,” 22nd Nat. Information Systems Security Conference, 2011.
http://csrc.nist.gov/nissc/1999/proceedings/papers/p11.pdf
|
[10]
|
J. D. Farmer, N. H. Packard and A. S. Perelson, “The Immune System, Adaptation, and Machine Learning,” Physica D, Vol. 22, No. 1-3, 1986, pp. 187-204.
doi:10.1016/0167-2789(86)90240-X
|
[11]
|
A. S. Perelson, “Immune Network Theory,” Immunological Reviews, Vol. 110, No. 1, 1989, pp. 5-36.
doi:10.1111/j.1600-065X.1989.tb00025.x
|
[12]
|
F. Varela, A. Coutinho, B. Dupire and N. Vaz, “Cognitive Networks: Immune, Neural and Otherwise,” Theoretical Immunology, Vol. 2, 1988, pp. 359-375.
|
[13]
|
I. R. Tizard, “Immunology: Introduction,” 4th Edition, Saunders College Publishing, Philadelphia, 1995.
|
[14]
|
S. A. Hofmeyr and S. Forrest, “Architecture for an Artificial Immune System,” Evolutionary Computation Journal, Vol. 8, No. 4, 2000, pp. 443-473.
doi:10.1162/106365600568257
|
[15]
|
J. Kim and P. Bentley, “The Human Immune System and Network Intrusion Detection,” 7th European Conference on Intelligent Techniques and Soft Computing, Aachen, 1999.
|
[16]
|
J. Kim and P. J. Bentley, “Negative Selection and Niching by an Artificial Immune System for Network Intrusion Detection,” Proceedings of Late-Breaking Papers at the Genetic and Evolutionary Computation Conference, Orlando, 13-17 July 1999, pp. 149-158.
|
[17]
|
S. Forrest, A. S. Perelson, L. Allen and R. Cherukuri, “Self-Nonself Discrimination in a Computer,” Proceedings of the 1994 IEEE Symposium on Research in Security and Privacy, IEEE Computer Society Press, Los Alamitos, 1994, pp. 202-212.
|
[18]
|
S. Hofmeyr and S. Forrest, “Architecture far ao Ariificial Immune System,” Evolutionary Computation, Vol. 7, No. 1, 1999, pp. 45-68.
|
[19]
|
G. Doziert, D. Brownf, J. Hurley and K. Cainf, “Vulnerability Analysis of AIS-Based Intrusion Detection Systems via Genetic and Particle Swarm Red Teams,” Evolutionary Computation, Vol. 1, 2004, pp. 111-116.
|
[20]
|
J. W. Kim and P. J. Bentley, “Towards an Artificial Immune System for Network Intrusion Detection: An Investigation of Clonal Selection with a Negative Selection Operator,” Evolutionary Computation, Vol. 2, 2001, pp. 1244-1252.
|
[21]
|
R. P. Lippmann, D. J. Fried, I. Graf, J. W. Haines, K. R. Kendall, D. McClung, D. Weber, S. E. Webster, D. Wyschogrod, R. K. Cunningham and M. A. Zissman, “Evaluating Intrusion Detection Systems: The 1998 Darpa Off-Line Intrusion Detection Evaluation,” Discex, Vol. 2, 2000, p. 1012.
|
[22]
|
A. Zainal, M. A. Maarof and S. M. Shamsuddin, “Feature Selection Using Rough Set in Intrusion Detection,” 2006 IEEE Region 10 Conference, pp. 1-4.
|
[23]
|
L. Zhang, G. Zhang, L. Yu, J. Zhang and Y. Bai, “Intrusion Detection Using Rough Set Classification,” Journal of Zheijiang University Science, Vol. 5, No. 9, 2004, pp. 1076-1086. doi:10.1631/jzus.2004.1076
|