On the Surprising Behavior of Distance Metrics in High Dimensional Space, LNCS, vol.1973, pp.420-434, 2001. ,
DOI : 10.1007/3-540-44503-X_27
Coverage and generalization in an artificial immune system, Proc. of the Genetic and Evolutionary Computation Conference, pp.9-13, 2002. ,
Hardware Approach for Generating b-detectors by Immune-Based Algorithms, Computer Information Systems and Industrial Management, LNCS, vol.8838, pp.615-623, 2014. ,
DOI : 10.1007/978-3-662-45237-0_56
RTL Hardware Design Using Vhdl: Coding For Efficiency, Portability, and Scalability, 2006. ,
DOI : 10.1002/0471786411
On the distance norms for multidimensional dataset in the case of real-valued negative selection application. Zeszyty Naukowe Politechniki Biaa lostockiej, pp.39-50, 2007. ,
Hybrid Negative Selection Approach for Anomaly Detection, Computer Information Systems and Industrial Management, pp.242-253, 2012. ,
DOI : 10.1007/978-3-642-33260-9_21
URL : https://hal.archives-ouvertes.fr/hal-01551730
A sense of self for Unix processes, Proceedings 1996 IEEE Symposium on Security and Privacy, pp.120-128, 1996. ,
DOI : 10.1109/SECPRI.1996.502675
Self-nonself discrimination in a computer, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy, pp.202-212, 1994. ,
DOI : 10.1109/RISP.1994.296580
URL : http://www.santafe.edu/media/workingpapers/94-06-038.pdf
An artificial immune system architecture for computer security applications, IEEE Transactions on Evolutionary Computation, vol.6, issue.3, pp.252-280, 2002. ,
DOI : 10.1109/TEVC.2002.1011540
URL : http://www.mnlab.cs.depaul.edu/~mtaibah/papers/control and containment/An artificial immune system architecture for computer security applications.pdf
Real-valued negative selection algorithm with variable-sized detectors. Genetic and Evolutionary Computation GECCO-2004, Part I, LNCS, vol.3102, pp.287-298, 2004. ,
DOI : 10.1007/978-3-540-24854-5_30
URL : http://www.zhouji.net/prof/438reformat.pdf
Revisiting Negative Selection Algorithms, Evolutionary Computation, vol.1, issue.3, pp.223-251, 2007. ,
DOI : 10.1109/TEVC.2002.1011540
URL : http://www.mitpressjournals.org/userimages/ContentEditor/1164817256746/lib_rec_form.pdf
Is negative selection appropriate for anomaly detection? GECCO, pp.321-328, 2005. ,
DOI : 10.1145/1068009.1068061
High-Performance Computing Using FPGAs, 2013. ,
DOI : 10.1007/978-1-4614-1791-0