2011
DOI: 10.1080/18756891.2011.9727800
|View full text |Cite
|
Sign up to set email alerts
|

A Negative Selection Algorithm Based on Hierarchical Clustering of Self Set and its Application in Anomaly Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2012
2012
2019
2019

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 16 publications
(2 citation statements)
references
References 12 publications
0
2
0
Order By: Relevance
“…Based on real valued NSA, two algorithms were abbreviated as HC-RNSA and CB-RNSA have been proposed in (Wen, 2011;Wen, 2013), the authors demonstrated that in high dimensional space, the Euclidian distance suffers from the dimension disaster, and the discrimination between self and non-self becomes harder. Therefore, they proposed fractional order distance to evaluate the matching degree between real vectors; the proposed algorithm can reduce the detector training cost.…”
Section: Nsa With Variable-sized Detectorsmentioning
confidence: 99%
“…Based on real valued NSA, two algorithms were abbreviated as HC-RNSA and CB-RNSA have been proposed in (Wen, 2011;Wen, 2013), the authors demonstrated that in high dimensional space, the Euclidian distance suffers from the dimension disaster, and the discrimination between self and non-self becomes harder. Therefore, they proposed fractional order distance to evaluate the matching degree between real vectors; the proposed algorithm can reduce the detector training cost.…”
Section: Nsa With Variable-sized Detectorsmentioning
confidence: 99%
“…Hamming matching rule was used to compute the affinity between antigens and immune cells (Distance=80). Since the intrusion detection system-inspired by artificial immune has many desirable attributes including self-learning, adaptability, diversity, which can well detect unknown attacks and approved in many researches 13,[15][16][17] , the emphases of the experiments are intrusion responses.…”
Section: Simulationsmentioning
confidence: 99%