has been cited by the following article(s):
[1]
|
Sentiment Analysis during the third wave of COVID-19 outbreak: A Twitter case study
|
|
NeuroQuantology,
2022 |
|
|
[2]
|
Rozdział 2 Tolerancyjny algorytm V-Detector
|
|
WYBRANE ZAGADNIENIA INFORMATYKI …,
2021 |
|
|
[3]
|
Classification techniques based on Artificial immune system algorithms for Heart disease using Principal Component Analysis
|
|
2020 |
|
|
[4]
|
NSNAD: negative selection-based network anomaly detection approach with relevant feature subset
|
|
Neural Computing and Applications,
2019 |
|
|
[5]
|
Tolerant V-Detector algorithm
|
|
Journal of Physics: Conference Series,
2018 |
|
|
[6]
|
ARTIFICIAL IMMUNE SYSTEM FOR STATIC AND DYNAMIC PRODUCTION SCHEDULING PROBLEMS
|
|
Thesis,
2017 |
|
|
[7]
|
NSL-KDD dataset Classification Using Five Classification Methods and Three Feature Selection Strategies
|
|
2017 |
|
|
[8]
|
E-CLONALG: A classifier based on Clonal Selection Algorithm
|
|
2017 |
|
|
[9]
|
DAWA: Defending against wormhole attack in MANETs by using fuzzy logic and artificial immune system
|
|
The Journal of Supercomputing,
2017 |
|
|
[10]
|
E-CLONALG: An Enhanced Classifier Developed from CLONALG
|
|
Computational Intelligence in Data Mining,
2017 |
|
|
[11]
|
Application of Rough Sets to Negative Selection Algorithms
|
|
Future Data and Security Engineering,
2017 |
|
|
[12]
|
Defending against Wormhole Attack in MANET Using an Artificial Immune System
|
|
New Review of Information Networking,
2016 |
|
|
[13]
|
一种基于进化神经网络的混合入侵检测模型
|
|
2016 |
|
|
[14]
|
Artificial immune system based organizational data prediction
|
|
2016 |
|
|
[15]
|
Applying Artificial Immune System for Outlier Detection: A Comparative Study
|
|
2015 |
|
|
[16]
|
Securing Big Data Using Natural Computing Techniques
|
|
Supported by,
2014 |
|
|
[17]
|
A study of anamoly detection in networking using soft computing techniques
|
|
NULL
2014 |
|
|
[18]
|
Negative Selection Approach Application in Network Intrusion Detection Systems
|
|
arXiv preprint arXiv:1403.2716,
2014 |
|
|
[19]
|
Improving the speed of the network intrusion detection
|
|
Information and Knowledge Technology (IKT), 2013 5th Conference on. IEEE,
2013 |
|
|
[20]
|
CONVERGENCE TENDENCY OF GENETIC ALGORITHMS AND ARTIFICIAL IMMUNE SYSTEM IN SOLVING CONTINUOUS OPTIMIZATION FUNCTIONS
|
|
International Journal of Computer Science & Information Technology? ,
2013 |
|
|
[1]
|
Classification techniques based on Artificial immune system algorithms for Heart disease using Principal Component Analysis
International Journal of Scientific Research in Science, Engineering and Technology,
2021
DOI:10.32628/IJSRSET207542
|
|
|
[2]
|
NSNAD: negative selection-based network anomaly detection approach with relevant feature subset
Neural Computing and Applications,
2019
DOI:10.1007/s00521-019-04396-2
|
|
|
[3]
|
Tolerant V-Detector algorithm
Journal of Physics: Conference Series,
2018
DOI:10.1088/1742-6596/1061/1/012021
|
|
|
[4]
|
DAWA: Defending against wormhole attack in MANETs by using fuzzy logic and artificial immune system
The Journal of Supercomputing,
2017
DOI:10.1007/s11227-017-2075-x
|
|
|
[5]
|
Computational Intelligence in Data Mining
Advances in Intelligent Systems and Computing,
2017
DOI:10.1007/978-981-10-3874-7_26
|
|
|
[6]
|
Future Data and Security Engineering
Lecture Notes in Computer Science,
2017
DOI:10.1007/978-3-319-70004-5_27
|
|
|
[7]
|
Analysis of Students’ Misconception Based on Rough Set Theory
Journal of Intelligent Learning Systems and Applications,
2013
DOI:10.4236/jilsa.2013.52008
|
|
|
[8]
|
Improving the speed of the network intrusion detection
The 5th Conference on Information and Knowledge Technology,
2013
DOI:10.1109/IKT.2013.6620044
|
|
|