Danger Theory: The Link between AIS and IDS, 2nd International Conference on Artificial Immune Systems, 2003. ,
Sensing Danger: Innate Immunology for Intrusion Detection, pp.218-227, 2007. ,
Artificial Immune Systems in Intrusion Detection, chapter 7 of " Enhancing computer security with smart technology, 2005. ,
Immunological Computation, theory and application, 2009. ,
An Introduction to Intrusion-Detection Systems, Proceedings of Connect, 2000. ,
Introducing Adjuvants to Dendritic Cell Algorithm for Stealthy Malware Detection, 2012 Fifth International Symposium on Computational Intelligence and Design, pp.18-22 ,
DOI : 10.1109/ISCID.2012.156
Smart Intrusion Detection Method Using Negative Selection Algorithm Based on Maximum Entropy Model, 2009 International Conference on Artificial Intelligence and Computational Intelligence, pp.339-344, 2009. ,
DOI : 10.1109/AICI.2009.92
Neural Network and Artificial Immune Systems for Malware and Network Intrusion Detection, Advances in Machine Learning II, SCI 263, pp.485-513, 2010. ,
DOI : 10.1007/978-3-642-05179-1_23
Introducing Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomaly Detection, Proceedings of the 4th international conference on Artificial Immune Systems, pp.153-167, 2005. ,
DOI : 10.2139/ssrn.2832073
Dendritic Cells for Anomaly Detection, Evolutionary Computation, pp.664-671, 2006. ,
The Dendritic Cell Algorithm, 2007. ,
The DCA: SOMe comparison, Evolutionary Intelligence, vol.25, issue.7, pp.85-112, 2008. ,
DOI : 10.1007/s12065-008-0008-6
Selecting features for intrusion detection: A feature relevance analysis on kdd 99 intrusion detection datasets, Proceedings of the Third Annual Conference on Privacy, Security and Trust, 2005. ,
Immune system approaches to intrusion detection ??? a review, Natural Computing, vol.1, issue.3, pp.413-466, 2007. ,
DOI : 10.1007/s11047-006-9026-4
An Efficient Approach to Categorize Data Using Improved Dendritic Cell Algorithm with Dempster Belief Theory, Proceedings of All India Seminar on Biomedical Engineering, pp.165-172, 2013. ,
DOI : 10.1007/978-81-322-0970-6_20
A Cooperative AIS Framework for Intrusion Detection, 2007 IEEE International Conference on Communications, pp.1409-1416, 2007. ,
DOI : 10.1109/ICC.2007.237
Malicious Code Detection Architecture Inspired by Human Immune System, 2008 Ninth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, pp.312-317, 2008. ,
DOI : 10.1109/SNPD.2008.160
A Negative Selection Approach to Intrusion Detection, Artificial Immune Systems, Lecture Notes in Computer Science 7597, pp.178-190, 2012. ,
DOI : 10.1007/978-3-642-33757-4_14
Intrusion Detection, Fundamentals of Computer Security, 2003. ,
DOI : 10.1007/978-3-662-07324-7_14
Intrusion Detection System for Wireless Sensor Networks Using Danger Theory Immune-Inspired Techniques, International Journal of Wireless Information Networks, vol.32, issue.1, pp.39-66, 2013. ,
DOI : 10.1007/s10776-012-0179-z
Anomaly detection in TCP/IP networks using immune systems paradigm, Computer Communications, vol.30, issue.4, pp.740-749, 2006. ,
DOI : 10.1016/j.comcom.2006.08.016
Artificial Immune Clonal Selection Classification Algorithms for Classifying Malware and Benign Processes Using API Call Sequences, International Journal of Computer Science and Network Security, vol.10, issue.4, 2010. ,
How do we evaluate artificial immune systems, Evolutionary Computation, vol.13, issue.2, pp.145-178, 2005. ,
On the Appropriateness of Negative Selection for Anomaly Detection and Network Intrusion Detection, 2006. ,
Artificial Immune for Harmful Information Filtering ,
DOI : 10.1007/978-3-642-21762-3_16
Research of Immune Intrusion Detection Algorithm Based on Semi-supervised Clustering, Artificial Intelligence and Computational Intelligence Lecture Notes in Computer Science 7003, pp.69-74, 2011. ,
DOI : 10.1007/978-3-642-23887-1_9
A New Intrusion Detection Method Based on Antibody Concentration, Emerging Intelligent Computing Technology and Applications, With Aspects of Artificial Intelligence Lecture Notes in Computer Science, vol.5755, pp.500-509, 2009. ,