2012 |
|
Evasion Attack of Multi-Class Linear Classifiers
Proceedings of the 16th Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD)
|
2011 |
|
A Supervised Topic Transition Model for Detecting Malicious System Call Sequences
KDD Workshop on Knowledge Discovery, Modeling, and Simulation
|
|
|
Artificial Immune Systems - 10th International Conference, ICARIS 2011, Cambridge, UK, July 18-21, 2011. Proceeding
|
2010 |
|
On Immunological Memory as a Function of a Recursive Proliferation Process
15th IEEE International Conference on Engineering of Complex Computer Systems
|
|
|
Efficient Collapsed Gibbs Sampling For Latent Dirichlet Allocation
Asian Conference on Machine Learning (ACML)
|
|
|
A Study of Detecting Computer Viruses in Real-Infected Files in the n-gram Representation with Machine Learning Methods
A Study of Detecting Computer Viruses in Real-Infected Files in the n-gram Representation with Machine Learning Methods
|
2009 |
|
Foundations of r-contiguous Matching in Negative Selection for Anomaly Detection
Natural Computing
|
|
|
Geometrical Insights into the Dendritic Cell Algorithm
Proceedings of the Genetic and Evolutionary Computation Conference (GECCO-2009)
|
2008 |
|
An Empirical Study of Self/Non-Self Discrimination in Binary Data with a Kernel Estimator
Proceedings of the 7th International Conference on Artificial Immune Systems (ICARIS)
|
|
|
Discriminating Self from Non-Self with Finite Mixtures of Multivariate Bernoulli Distributions
Proceedings of the Genetic and Evolutionary Computation Conference (GECCO)
|
|
|
Theoretical Advances in Artificial Immune Systems
Theoretical Computer Science
|
2007 |
|
Phase Transition and the Computational Complexity of Generating r-contiguous Detectors
Proceedings of the 6th International Conference on Artificial Immune Systems (ICARIS-2007)
|
|
|
Comments on Real-Valued Negative Selection vs. Real-Valued Positive Selection and One-Class SVM
Proceedings of the Congress on Evolutionary Computation (CEC-2007)
|
|
|
Detecting Node Compromise in Hybrid Wireless Sensor Networks Using Attestation Techniques
Proceedings of the Fourth European Workshop on Security and Privacy in Ad hoc and Sensor Networks
|
2006 |
|
Artificial Immune Systems for IT-Security
it-Information Technology (Systems Biology and Information Technology)
|
|
|
On the Use of Hyperspheres in Artificial Immune Systems as Antibody Recognition Regions
Proceedings of the 5th International Conference on Artificial Immune Systems (ICARIS-2006)
|
|
|
On Permutation Masks in Hamming Negative Selection
Proceedings of the 5th International Conference on Artificial Immune Systems (ICARIS-2006)
|
|
|
The Link between r-contiguous Detectors and k-CNF Satisfiability
Proceedings of the Congress on Evolutionary Computation (CEC-2006)
|
|
|
Generalization Regions in Hamming Negative Selection
Intelligent Information Systems (IIS-2006)
|
|
|
On the Appropriateness of Negative Selection for Anomaly Detection and Network Intrusion Detection
|
2005 |
|
Is Negative Selection Appropriate for Anomaly Detection ?
Proceedings of the ACM SIGEVO Genetic and Evolutionary Computation Conference (GECCO-2005)
|
|
|
A Comparative Study of Real-Valued Negative Selection to Statistical Anomaly Detection Techniques
Proceedings of the 4th International Conference on Artificial Immune Systems (ICARIS-2005)
|
|
|
On the Appropriateness of Negative Selection defined over Hamming Shape-Space as a Network Intrusion Detection System
Proceedings of the Congress on Evolutionary Computation (CEC-2005)
|
2004 |
|
An Investigation of R-Chunk Detector Generation on Higher Alphabets
Genetic and Evolutionary Computation GECCO 2004
|