Citation: | FANG Xian-jin, WANG Li. Theoretical investigation on the dendritic cells algorithm[J].JOURNAL OF BEIJING INSTITUTE OF TECHNOLOGY, 2014, 23(3): 401-406. |
[1] |
Greensmith J. The dendritic cell algorithm. Nottingham: School of Computer Science. University of Nottingham, 2007.
|
[2] |
Lutz M B, Schuler G. Immature, semi-mature and fully mature dendritic cells: which signals induce tolerance or immunity?[J] Trends Immunol, 2002. 23(9): 445-449.
|
[3] |
Al-Hammadi Y, Aickelin U, Greensmith J. DCA for bot detection [C]//Proceedings of the IEEE World Congress on Computational Intelligence (WCCI 2008). Berlin Heidelberg: Springer-Verlag, 2008: 1807-1816.
|
[4] |
Greensmith J, Aickelin U. Dendritic cells for SYN scan detection [C]//Proceedings of the Genetic and Evolutionary Computation Conference (GECCO 2007). London, UK: ACM Press, 2007: 49-56.
|
[5] |
Fu Jun, Liang Yiwen, Tan Chengyu, et al. Detecting software keyloggers with dendritic cell algorithm [C]//Proc of 2010 International Conference on Communications and Mobile Computing. NewYork: IEEE Computer Society Press, 2010: 111-115.
|
[6] |
Al-Hammadi Y A A. Behavioural correlation for malicious bot detection[D]. Nottingham: The University of Nottingham, 2010.
|
[7] |
Stibor T, Oates R, Kendall G, et al. Geometrical insights into the dendritic cell algorithm [C]//Proc of the Genetic and Evolutionary Computation Conference (GECCO), 2009: 1275-1282.
|
[8] |
Oates R. The suitability of the dendritic cell algorithm for robotic security applications[D]. Nottingham: School of Computer Science, University of Nottingham, 2010.
|
[9] |
Gu Feng, Greensmith J, Aickelin U. Exploration of the dendritic cell algorithm with the duration calculus [C]//Proceedings of the 8th International Conference on Artificial Immune Systems (ICARIS 2009). Springer, Berlin, 2009: 54-66.
|
[10] |
Timmis J, Home A, Stibor T, et al. Theoretical advance in artificial immune systems[J]. Theoretical Computer Science, 2008, 403: 11-32.
|
[11] |
Elberfeld M, Textor J. Negative selection algorithms on strings with efficient training and linear-time classification[J]. Theoretical Computer Sicence, 2011, 412(6): 534-542.
|
[12] |
Cormen T H, Leiserson C E, Rivest R L, et al. Introduction to algorithms[M]. Third Edition (Hardcover) ed. The MIT Electrical Engineering and Computer Sicence Series. The MIT Press, 2009.
|
[13] |
Gu Feng, Greensmith J, Oates R, et al. PCA 4 DCA: the application of principal component analysis to the dendritic cell algorithm [C]//Proceedings of the 9th Annual Workshop on Computational Intelligence (UKCI), 2009.
|
[14] |
Mokhtar M, Bi R, Timmis J, et al. A modified dendritic cell algorithm for on-line error detection in robotic systems [C]//Proceedings of the 11th IEEE Congress on Evolutionary Computation(CEC), 2009: 2055-2062.
|
[15] |
Gu Feng, Greensmith J, Aickelin U. The dendritic cell algorithm for intrusion detection[J]. Bio-Inspired Communications and Networking, IGI Global, 2011: 84-102.
|
[16] |
Gu Feng, Greensmith J, Aickelin U. Integrating real-time analysis with the dendritic cell algorithm through segmentation [C]//Proceedings of the Genetic and Evolutionary Computation Conference(GECCO), 2009: 1203-1210.
|