期刊文献+

否定选择算法综述 被引量:30

Survey of negative selection algorithms
下载PDF
导出
摘要 对否定选择算法进行了综述,首先回顾了否定选择算法的产生与发展;接着按照不同技术标准对其进行分类,并列举否定选择算法的实际应用情况;最后讨论了该算法所存在的问题以及未来的发展方向。 A review of NS was given. Firstly, the basic principle of negative selection algorithm and its history were introduced. Secondly, various negative selection algorithms were grouped into different categories by different criteria and the application of NS was described. Besides, some open problems in the development of NS algorithms were pre-sented and analyzed. Finally, a discussion of future trends was conclued.
出处 《通信学报》 EI CSCD 北大核心 2013年第1期159-170,共12页 Journal on Communications
基金 国家自然科学基金资助项目(61272310) 福建省自然科学基金资助项目(2010J01342) 中央高校基本科研业务费基金资助项目~~
关键词 否定选择算法 人工免疫系统 匹配规则 检测器生成 异常检测 negative selection algorithms artificial immune system matching rule detector generation anomaly detec-tion
  • 相关文献

参考文献86

  • 1DASGUPTAA D, YUA S,NINO E Recent advances in artificial immune systems: models and applications[J]. Applied Soft Computing, 2011, 11:1574-1587.
  • 2ZHOU J, DASGUPTA D. Revisiting negative selection algorithms[J]. Evolut Comput, 2007, 15(2):223-251.
  • 3FORREST S, PERELSON A S, ALLEN L, et al. Self-nonself discrimination in a computer[A]. Proceedings of the 1994 IEEE Symposium on Research in Security and Privacy IEEE[C]. Los Alamitos, CA, 1994. 221-231.
  • 4DASGUPTA D, FORREST S. Novelty detection in time series data using ideas from immunology[A]. Proceedings of the 5th International Conference on Intelligent Systems[C]. Cancun, Mexico: Springer, 1996. 82-87.
  • 5ZHOU J, DASGUPTA D. Real-valued negative selection algorithm with variable-sized detectors[A]. Proceedings of GECCO[C]. Springer, 2004. 287-298.
  • 6D'HAESELEER P. An immunological approach to change detection: theoretical results[A]. Proceedings of the 9th IEEE Computer Security Foundations Workshop. IEEE[C]. 1996. 18-27.
  • 7D'HAESELEER P, FORREST S, HELMAN P. An immunological approach to change detection: algorithms, analysis, and implications[A]. Proceedings of the 1996 IEEE Symposium on Computer Security and Privacy[C]. Washington, DC, USA, 1996. 110-120.
  • 8BALTHROP J, ESPONDA F, FORRREST S, et al. Coverage and generalization in an aritificial immune system[A]. Proceedings of the Genetic and Evolutionary Computation Conference (GECCO 2002)[C]. New York, USA, 2002.3-10.
  • 9WIERZCHON S T. Generating optimal repertoire of antibody strings in an artificial immune system[A]. Intelligent Information Systems. Heidelberg New York[C]. New York, USA, 2000. 119-133.
  • 10KIM J, BENTLEY P J. An evaluation of negative selection in an artificial immune system for network intrusion detection[A]. Proceedings of The Genetic and Evolutionary Computation Conference[C]. 2001. 1330-1337.

二级参考文献269

共引文献239

同被引文献265

引证文献30

二级引证文献62

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部