[1]
Thomas Stibor, Philipp Mohr, Jonathan Timmis. Is negative selection appropriate for anomaly detection? In Proceedings Genetic and Evolutionary Computation Conference(GECCO) , DC, USA, (2005).
DOI: 10.1145/1068009.1068061
Google Scholar
[2]
Edgar Chavez, Gonzalo Navarro. Measuring the dimensionality of general metric spaces. Technical Report TR/DCC-00-1, Department of Computer Science, University of Chile, (2000).
Google Scholar
[3]
S. Forrest, A. S. Perelson, L. Allen, and R. Cherukuri. Self-nonself discrimination in a computer, in Proceedings of the IEEE Symposium on Research in Security and Privacy. IEEE Computer Society Press, (1994), p.202–212.
DOI: 10.1109/risp.1994.296580
Google Scholar
[4]
Gonzalez,F., D. Dasgupta, L.F. Nino, A randomized real-valued negative selection algorithm. in Proceedings of the 2nd International Conference on Artificial Immune Systems (ICARIS). LNCS, Edinburgh, UK, Springer - Verlag, (2003), pp.261-272.
DOI: 10.1007/978-3-540-45192-1_25
Google Scholar
[5]
Zhou Ji, D. Dasgupta. Real-valued negative selection algorithm with variable-sized detectors. In Proceedings Genetic and Evolutionary Computation Conference (GECCO), (2004), pp.287-298.
DOI: 10.1007/978-3-540-24854-5_30
Google Scholar
[6]
Zhou Ji, D. Dasgupta. V-detector: An efficient negative selection algorithm with probably adequate, detector coverage. Information sciences, 2009, pp.1390-1406.
DOI: 10.1016/j.ins.2008.12.015
Google Scholar
[7]
Li Tao immune based dynamic intrusion detectionmodel. China Sci Bull (2005), pp.2650-2657.
Google Scholar
[8]
J Nievergelt. The Grid File: An Adaptable, Symmetric Multikey File Structure. ACM Transactions on Database Systems (TODS) archive Vol. 9 (1984), pp.38-71.
DOI: 10.1145/348.318586
Google Scholar
[9]
Stand UCI dataset Abalone Data Set, http: /archive. ics. uci. edu/ml/datasets. html.
Google Scholar