2022
DOI: 10.1109/tai.2021.3114661
|View full text |Cite
|
Sign up to set email alerts
|

Negative Selection Algorithm Research and Applications in the Last Decade: A Review

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(3 citation statements)
references
References 153 publications
0
3
0
Order By: Relevance
“…When determining the characteristics of failure and the time to determine failure, it is possible to build a control system that is proactively stable before failure. That is, the system can recover from damage by either automatically changing the system's structure, automatically changing the working algorithm, or using backup sensors [20], [21]. To restore the system's working ability, signal correction methods, coefficient correction methods or structural change methods are often used.…”
Section: Restore the Workabilitymentioning
confidence: 99%
“…When determining the characteristics of failure and the time to determine failure, it is possible to build a control system that is proactively stable before failure. That is, the system can recover from damage by either automatically changing the system's structure, automatically changing the working algorithm, or using backup sensors [20], [21]. To restore the system's working ability, signal correction methods, coefficient correction methods or structural change methods are often used.…”
Section: Restore the Workabilitymentioning
confidence: 99%
“…class [50,51]. The fields of classification and noise reduction [52], test data generation [53], anomaly detection [54], email spam detection [55], and other scenarios are some of the applications of the NSA.…”
Section: Negative Selection Approachmentioning
confidence: 99%
“…The main characteristics of the immune system are the ability to distinguish self from non-self and the cloning principle. In the artificial immune system research area, the first characteristic has produced many algorithms, denoted as negative selection algorithms (Gupta and Dasgupta, 2022 ), which have also been applied to the general problem of intrusion detection (Singh et al, 2022 ) and also anomaly detection (Saurabh and Verma, 2023 ). The clonal selection principle, likewise, has inspired the design of many algorithms obtained by setting and combining the parameters of the main operators: (i) cloning; (ii) hypermutation; and (iii) aging.…”
Section: Metaheuristics Machine Learning and Anomaly Detectionmentioning
confidence: 99%