References
- Chee-Yee Chong, S. P. Kumar, "Sensor networks: evolution, opportunities, and challenges," Proceedings of the IEEE, vol. 91, no. 8, pp. 1247-1256, August, 2003. https://doi.org/10.1109/JPROC.2003.814918
- I. Butun, S. Morgera, R. Sankar, "A survey of intrusion detection systems for wireless sensor networks," IEEE Communications Surveys Tutorials, vol. 6,no. 1, pp. 266-282, May, 2014.
- H. M. Salmon, C. M. D. Farias, P. Loureiro, L. Pirmez, "Intrusion detection system for wireless sensor networks using danger theory immune-inspired techniques," International journal of wireless information networks, vol. 20, no. 1, pp. 39-66, March, 2013. https://doi.org/10.1007/s10776-012-0179-z
- S. Forrest, A. S. Perelson, L. Allen, R. Cherukuri, "Self-nonself discrimination in a computer." in Proc. of the 1994 IEEE Computer Society Symposium on IEEE, pp. 202-212, May 16-18, 1994.
- X. Z. Gao, S. J. Ovaska, X. Wang, "Genetic algorithms-based detector generation in negative selection algorithm," in Proc. of 2006 IEEE Mountain Workshop on Adaptive and Learning Systems,pp. 133-137, July 24-26, 2006.
- Z. X. Cai, W. Yong, "A multiobjective optimization-based evolutionary algorithm for constrained optimization," IEEE Transactions on Evolutionary Computation, vol. 10, no. 6, pp. 658-675, November, 2006. https://doi.org/10.1109/TEVC.2006.872344
- R. Storn, P. Kenneth, "Differential evolution-a simple and efficient heuristic for global optimization over continuous spaces," Journal of global optimization, vol. 11, no. 4, pp. 341-359, December, 1997. https://doi.org/10.1023/A:1008202821328
- J. Morteza, M. Hossein, M. Kasra, F. Mohammad, S. Shahaboddin, "A method in security of wireless sensor network based on optimized artificial immune system in multi-agent environments," Research Journal of Recent Science, vol. 2, no. 10, pp. 99-106, August, 2013.
- M. Zeeshan, H. Javed, A. Haider, A. Khan, "An immunology inspired flow control attack detection using negative selection with R-contiguous bit matching for wireless sensor networks," International Journal of Distributed Sensor Networks, vol. 11, no. 11, January, 2015.
- R. Rizwan, F. A. Khan, H. Abbas, S. H. Chauhdary, "Anomaly detection in Wireless Sensor Networks using immune-based bioinspired mechanism," International Journal of Distributed Sensor Networks, vol. 11, no. 10, January, 2015.
- M. Drozda, S. Schaust, H. Szczerbicka, "AIS for misbehavior detection in wireless sensor networks: Performance and design principles," in Proc. of the 2007 IEEE Congress on Evolutionary Computation, pp. 3719-3726, September 25-28, 2007.
- Y. Liu, F. Q. Yu, "Immunity-based intrusion detection for wireless sensor networks," in Proc. of IEEE International Joint Conference on Neural Networks, pp. 439-444, June 1-8, 2008.
- R. Fu, K. Zheng, T. Lu, D. Zhang, Y. Yang, "Biologically inspired anomaly detection for hierarchical wireless sensor networks," Journal of Networks, vol. 7, no. 8, pp. 1214-1219, August, 2012.
- J. Zhou, "Negative Selection Algorithms: from the Thymus to V-detector," The University of Memphis, 2006.
- F. Gonzalez, D. Dasgupta, R. Kozma, "Combining negative selection and classification techniques for anomaly detection,"in Proc. of Congress on Evolutionary Computation, vol. 1, no. 11, pp. 705-710, May 12-17, 2002.
- F. Gonzalez, D. Dasgupta. "A study of artificial immune systems applied to anomaly detection," The University of Memphis , May, 2003.
- M. Ostaszewski, F. Seredynski, P. Bouvry, "Coevolutionary-based mechanisms for network anomaly detection," Journal of Mathematical Modelling and Algorithms, vol. 6, no. 3, pp. 411-431, March, 2007. https://doi.org/10.1007/s10852-007-9061-x
- R. Fu, K. F. Zheng, F. C. You, D. M. Zhang, B. Wu, "Anomaly detection algorithm based on fuzzy and immune theory in wireless sensor networks," Journal of Nanjing University of Science and Technology, vol. 36, no. 1, pp. 137-142, 2012.
- K. Deb, "Multi-objective optimization using evolutionary algorithms," John Wiley & Sons, Inc, vol. 16, 2001.
- R. Balling, "The maximin fitness function; multi-objective city and regional planning." in Proc. of International Conference on Evolutionary multi-criterion optimization, vol. 2632, pp. 1-15, April 8-11, 2003.
- C. A. C. Coello, "Theoretical and numerical constraint-handling techniques used with evolutionary algorithms: a survey of the state of the art," Computer methods in applied mechanics and engineering, vol. 191, no. 11, pp. 1245-1287, January, 2002. https://doi.org/10.1016/S0045-7825(01)00323-1
- Z. Ji, D. Dasgupta, "Estimating the detector coverage in a negative selection algorithm," in Proc. of the 7th annual conference on Genetic and evolutionary computation, pp. 281-288, June 25-29, 2005.
- H. Wang, X. Z. Gao, X. Huang, Z. Song, "PSO-optimized negative selection algorithm for anomaly detection," Advances in Soft Computing, vol. 52, pp.13-21, 2009.
- A. W. Iorio, X. Li, "Solving rotated multi-objective optimization problems using differential evolution," in Proc. of AI 2004: Advances in artificial intelligence, vol.3339, pp. 861-872, December 4-6, 2004.
- Fisher's iris data is available at ftp://ftp.ics.uci.edu/pub/machinelearning-databases/iris/.
- D. M. Farid, N. Harbi, M. Z. Rahman, "Combining naive bayes and decision tree for adaptive intrusion detection," Internation Journal of Network Security & Its Application, vol. 2, no. 2, pp.12-25, May, 2010. https://doi.org/10.5121/ijnsa.2010.2202
- X. Xiao, T. Li, R. Zhang, "An immune optimization based real-valued negative selection algorithm." Applied Intelligence, vol. 42, no. 2, pp. 289-302, March, 2015. https://doi.org/10.1007/s10489-014-0599-9
Cited by
- Intrusion Detection in Wireless Sensor Networks with an Improved NSA Based on Space Division vol.2019, pp.None, 2017, https://doi.org/10.1155/2019/5451263