Artificial immune system based on real valued negative selection algorithms for anomaly detection
The Real-Valued Negative Selection Algorithms, which are the focal point of this research, generate their detector sets based on the points of self data. Self data are regarded as the normal behavioral pattern of the monitored system. In this research, the Real-Valued Negative Selection with fixed-s...
| Main Author: | Khairi, Rihab Salah |
|---|---|
| Format: | Thesis |
| Language: | English English English |
| Published: |
2015
|
| Subjects: | |
| Online Access: | http://eprints.uthm.edu.my/1446/ http://eprints.uthm.edu.my/1446/2/RIHAB%20SALAH%20KHAIRI%20COPYRIGHT%20DECLARATION.pdf http://eprints.uthm.edu.my/1446/1/24p%20RIHAB%20SALAH%20KHAIRI.pdf http://eprints.uthm.edu.my/1446/3/RIHAB%20SALAH%20KHAIRI%20WATERMARK.pdf |
Similar Items
Real valued negative selection for anomaly detection in wireless ad hoc networks
by: Abdul Majid, Azri, et al.
Published: (2004)
by: Abdul Majid, Azri, et al.
Published: (2004)
Feature selection using Rough-DPSO in anomaly intrusion detection
by: Zainal, Anazida, et al.
Published: (2007)
by: Zainal, Anazida, et al.
Published: (2007)
Traffic Scene Anomaly Detection
by: Lu, Cai An
Published: (2017)
by: Lu, Cai An
Published: (2017)
Artificial Immune System Based Data Miner
by: Hassan Babiker, Amir Samir
Published: (2011)
by: Hassan Babiker, Amir Samir
Published: (2011)
An improved negative selection algorithm based on the hybridization of cuckoo search and differential evolution for anomaly detection
by: Ayodele Nojeem, Lasisi
Published: (2018)
by: Ayodele Nojeem, Lasisi
Published: (2018)
An Immune Inspired Approach to Anomaly Detection
by: Twycross, Jamie, et al.
Published: (2007)
by: Twycross, Jamie, et al.
Published: (2007)
Anomaly Detection in Time Series Data Using Spiking Neural Network
by: Bariah, Yusob, et al.
Published: (2018)
by: Bariah, Yusob, et al.
Published: (2018)
'Introducing Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomaly Detection'
by: Greensmith, Julie, et al.
Published: (2005)
by: Greensmith, Julie, et al.
Published: (2005)
Introducting Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomaly Detection
by: Greensmith, Julie, et al.
Published: (2005)
by: Greensmith, Julie, et al.
Published: (2005)
'Introducing Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomaly Detection'
by: Greensmith, Julie, et al.
Published: (2005)
by: Greensmith, Julie, et al.
Published: (2005)
Using Transformer Models for Stock Market Anomaly Detection
by: Biriukova, Kseniia, et al.
Published: (2023)
by: Biriukova, Kseniia, et al.
Published: (2023)
RED-Based Technique for Detecting and Avoiding Anomaly Network Congestion
by: Montaser, Mohamed Mostafa, et al.
Published: (2018)
by: Montaser, Mohamed Mostafa, et al.
Published: (2018)
Adapting Artificial Immune Algorithms For University Timetabling
by: Malim , Muhammad Rozi
Published: (2009)
by: Malim , Muhammad Rozi
Published: (2009)
Dendritic Cells for Real-Time Anomaly Detection
by: Greensmith, Julie, et al.
Published: (2006)
by: Greensmith, Julie, et al.
Published: (2006)
Alternate methods for anomaly detection in high-energy physics via semi-supervised learning
by: Md. Ali, Mohd. Adli, et al.
Published: (2020)
by: Md. Ali, Mohd. Adli, et al.
Published: (2020)
Artificial Bee Colony Algorithm for Pairwise Test Generation
by: Alazzawi, Ammar K., et al.
Published: (2017)
by: Alazzawi, Ammar K., et al.
Published: (2017)
Artificial Immune System and Intrusion Detection Tutorial
by: Aickelin, Uwe
Published: (2003)
by: Aickelin, Uwe
Published: (2003)
Artificial Immune System and Intrusion Detection Tutorial
by: Aickelin, Uwe
Published: (2003)
by: Aickelin, Uwe
Published: (2003)
Investigation Model for Ddos Attack Detection in Real-Time
by: Ahmed, Abdulghani Ali
Published: (2015)
by: Ahmed, Abdulghani Ali
Published: (2015)
Filtration Model For DDoS Attack Detection in Real-Time
by: Ahmed, Abdulghani Ali
Published: (2015)
by: Ahmed, Abdulghani Ali
Published: (2015)
Real time flood detection & monitoring system with wireless network sensors
by: Nur Ainina Asyra, Abdul Kadir
Published: (2016)
by: Nur Ainina Asyra, Abdul Kadir
Published: (2016)
Improved intrusion detection algorithm based on TLBO and GA algorithms
by: Aljanabi, Mohammad, et al.
Published: (2021)
by: Aljanabi, Mohammad, et al.
Published: (2021)
A detector generating algorithm for intrusion detection inspired by artificial immune system
by: Alsharafi, Walid Mohamed, et al.
Published: (2015)
by: Alsharafi, Walid Mohamed, et al.
Published: (2015)
Intrusion detection using artificial neural network / Gan Sze Kai
by: Gan , Sze Kai
Published: (2002)
by: Gan , Sze Kai
Published: (2002)
Epilepsy detection from EEG signals using artificial neural network
by: Sallam, Amer A., et al.
Published: (2019)
by: Sallam, Amer A., et al.
Published: (2019)
Artificial immune systems
by: Aickelin, Uwe, et al.
Published: (2014)
by: Aickelin, Uwe, et al.
Published: (2014)
Artificial immune systems
by: Greensmith, Julie, et al.
Published: (2010)
by: Greensmith, Julie, et al.
Published: (2010)
Artificial immune systems
by: Aickelin, Uwe, et al.
Published: (2005)
by: Aickelin, Uwe, et al.
Published: (2005)
Artificial immune systems
by: Aickelin, Uwe, et al.
Published: (2005)
by: Aickelin, Uwe, et al.
Published: (2005)
Detecting resource consumption attack over MANET using an artificial immune algorithm
by: Abdelhaq, Maha, et al.
Published: (2011)
by: Abdelhaq, Maha, et al.
Published: (2011)
Real time bus tracking system
by: Muhammad Addeib, Mohd Subari
Published: (2019)
by: Muhammad Addeib, Mohd Subari
Published: (2019)
Artificial Immune Algorithms For University Examination Timetabling.
by: Malim, Muhammad Rozi, et al.
Published: (2005)
by: Malim, Muhammad Rozi, et al.
Published: (2005)
Analysis of Parameterization Value Reduction of Soft Sets and its Algorithm
by: Mohammed, Mohammed Adam Taheir, et al.
Published: (2016)
by: Mohammed, Mohammed Adam Taheir, et al.
Published: (2016)
Code generation for embedded real time system
by: Talab, Mahmood Aghajani Siroos
Published: (2010)
by: Talab, Mahmood Aghajani Siroos
Published: (2010)
Hybrid artificial bee colony algorithm with branch and bound for two–sided assembly line balancing
by: Elteriki, Salem Abdulsalam
Published: (2018)
by: Elteriki, Salem Abdulsalam
Published: (2018)
The Potential of a Classification-based Algorithm to Calculate Calories in Real-Time Via Pattern Recognition
by: M. A., Ameedeen, et al.
Published: (2016)
by: M. A., Ameedeen, et al.
Published: (2016)
A comparison of different technique in flow based anomaly detection
by: Salah, Mohammad
Published: (2017)
by: Salah, Mohammad
Published: (2017)
Two Phase Shortest Path Algorithm for Non-Negative Undirected Graphs
by: Qureshi, MA., et al.
Published: (2010)
by: Qureshi, MA., et al.
Published: (2010)
EEG Based Detection Of Epilepsy And Anesthetic Level Using Artificial Neural Networks
by: Vairavan, Srinivasan
Published: (2006)
by: Vairavan, Srinivasan
Published: (2006)
Information Fusion for Anomaly Detection with the Dendritic Cell Algorithm
by: Greensmith, Julie, et al.
Published: (2007)
by: Greensmith, Julie, et al.
Published: (2007)
Similar Items
-
Real valued negative selection for anomaly detection in wireless ad hoc networks
by: Abdul Majid, Azri, et al.
Published: (2004) -
Feature selection using Rough-DPSO in anomaly intrusion detection
by: Zainal, Anazida, et al.
Published: (2007) -
Traffic Scene Anomaly Detection
by: Lu, Cai An
Published: (2017) -
Artificial Immune System Based Data Miner
by: Hassan Babiker, Amir Samir
Published: (2011) -
An improved negative selection algorithm based on the hybridization of cuckoo search and differential evolution for anomaly detection
by: Ayodele Nojeem, Lasisi
Published: (2018)