Table of Contents Author Guidelines Submit a Manuscript
The Scientific World Journal
Volume 2014 (2014), Article ID 156790, 11 pages
http://dx.doi.org/10.1155/2014/156790
Review Article

A Survey of Artificial Immune System Based Intrusion Detection

1College of Computer Science, Sichuan University, Chengdu 610064, China
2Computer School, China West Normal University, Nanchong 637002, China

Received 28 November 2013; Accepted 30 December 2013; Published 23 March 2014

Academic Editors: K. K. Mishra and A. K. Misra

Copyright © 2014 Hua Yang et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Citations to this Article [8 citations]

The following is the list of published articles that have cited the current article.

  • Dong Li, Shulin Liu, and Hongli Zhang, “A boundary-fixed negative selection algorithm with online adaptive learning under small samples for anomaly detection,” Engineering Applications of Artificial Intelligence, vol. 50, pp. 93–105, 2016. View at Publisher · View at Google Scholar
  • Guangshun Yao, Yongsheng Ding, Lihong Ren, Kuangrong Hao, and Lei Chen, “An Immune System-Inspired Rescheduling Algorithm for Workflow in Cloud Systems,” Knowledge-Based Systems, 2016. View at Publisher · View at Google Scholar
  • Praneet Saurabh, and Bhupendra Verma, “An efficient proactive artificial immune system based anomaly detection and prevention system,” Expert Systems with Applications, vol. 60, pp. 311–320, 2016. View at Publisher · View at Google Scholar
  • Diogo A.B. Fernandes, Mário M. Freire, Paulo A.P. Fazendeiro, and Pedro R.M. Inácio, “Applications of artificial immune systems to computer security: A survey,” Journal of Information Security and Applications, vol. 35, pp. 138–159, 2017. View at Publisher · View at Google Scholar
  • Guilherme Costa Silva, Walmir Matos Caminhas, and Luciano de Errico, “Dendritic Cell Algorithm Applied to Ping Scan Investigation Revisited: Detection Quality and Performance Analysis,” IEEE Transactions on Emerging Topics in Computational Intelligence, vol. 1, no. 4, pp. 236–247, 2017. View at Publisher · View at Google Scholar
  • Sidra Ijaz, Faheel A. Hashmi, Sohail Asghar, and Masoom Alam, “Vector Based Genetic Algorithm to optimize predictive analysis in network security,” Applied Intelligence, 2017. View at Publisher · View at Google Scholar
  • Tao Gong, Tiantian Fan, Jizheng Guo, and Zixing Cai, “GPU-based parallel optimization of immune convolutional neural network and embedded system,” Engineering Applications of Artificial Intelligence, vol. 62, pp. 384–395, 2017. View at Publisher · View at Google Scholar
  • Li Ang, Kah Seng, and Feng Ge, “Natural Inspired Intelligent Visual Computing and Its Application to Viticulture,” Sensors, vol. 17, no. 6, pp. 1186, 2017. View at Publisher · View at Google Scholar