“…In fact, the AIS aim to emulate the mechanisms and behaviors observed by the immunologists in order to be applied to a particular problem [15]. After a quite complex modeling phase, AIS have been successfully applied to various fields of digital knowledge, including optimization theory [29], data analysis [30], image recognition [31], and computer security [32]. More specifically, AIS-based proposals have arisen to solve cybersecurity challenges for anomaly detection, intrusion detection, malicious process detection, scan and flood detection, and fraud detection, among others [33], [34], [35], [36] others.…”