Sledovat
Peter J Bentley
Název
Citace
Citace
Rok
Evolutionary design by computers
P Bentley
Morgan Kaufmann, 1999
1164*1999
Creative evolutionary systems
DW Corne, PJ Bentley
Elsevier, 2001
5572001
Danger theory: The link between AIS and IDS?
U Aickelin, P Bentley, S Cayzer, J Kim, J McLeod
Artificial Immune Systems: Second International Conference, ICARIS 2003 …, 2003
5162003
Immune system approaches to intrusion detection–a review
J Kim, PJ Bentley, U Aickelin, J Greensmith, G Tedesco, J Twycross
Natural computing 6, 413-466, 2007
4282007
Three ways to grow designs: A comparison of embryogenies for an evolutionary design problem.
PJ Bentley, S Kumar
GECCO 99, 35-43, 1999
4151999
An evaluation of negative selection in an artificial immune system for network intrusion detection
J Kim, PJ Bentley
Proceedings of the 3rd Annual Conference on Genetic and Evolutionary …, 2001
4132001
The surprising creativity of digital evolution: A collection of anecdotes from the evolutionary computation and artificial life research communities
J Lehman, J Clune, D Misevic, C Adami, L Altenberg, J Beaulieu, ...
Artificial life 26 (2), 274-306, 2020
3862020
Towards an artificial immune system for network intrusion detection: an investigation of dynamic clonal selection
J Kim, PJ Bentley
Proceedings of the 2002 Congress on Evolutionary Computation. CEC'02 (Cat …, 2002
3832002
Finding acceptable solutions in the pareto-optimal range using multiobjective genetic algorithms
PJ Bentley, JP Wakefield
Soft computing in engineering design and manufacturing, 231-240, 1998
3761998
Towards an artificial immune system for network intrusion detection: An investigation of clonal selection with a negative selection operator
J Kim, PJ Bentley
Proceedings of the 2001 Congress on Evolutionary Computation (IEEE Cat. No …, 2001
3632001
Dynamic search with charged swarms
TM Blackwell, PJ Bentley
Proceedings of the 4th annual conference on genetic and evolutionary …, 2002
2982002
Investigating country differences in mobile app user behavior and challenges for software engineering
SL Lim, PJ Bentley, N Kanakam, F Ishikawa, S Honiden
IEEE Transactions on Software Engineering 41 (1), 40-64, 2014
2742014
The artificial immune model for network intrusion detection
J Kim, P Bentley
7th European Conference on Intelligent Techniques and Soft Computing (EUFIT …, 1999
2561999
On growth, form and computers
S Kumar, PJ Bentley
Elsevier, 2003
2372003
The human immune system and network intrusion detection
J Kim, P Bentley
7th European Conference on Intelligent Techniques and Soft Computing (EUFIT …, 1999
2231999
Immune memory in the dynamic clonal selection algorithm
J Kim, PJ Bentley
Proceedings of the First International Conference on Artificial Immune …, 2002
203*2002
Don't push me! Collision-avoiding swarms
TM Blackwell, P Bentley
Proceedings of the 2002 Congress on Evolutionary Computation. CEC'02 (Cat …, 2002
1992002
Particle swarm optimization recommender system
S Ujjin, PJ Bentley
Proceedings of the 2003 IEEE Swarm Intelligence Symposium. SIS'03 (Cat. No …, 2003
1642003
Improvised music with swarms
TM Blackwell, P Bentley
Proceedings of the 2002 Congress on Evolutionary Computation. CEC'02 (Cat …, 2002
1592002
Digital biology: how nature is transforming our technology and our lives
P Bentley
Simon and Schuster, 2001
159*2001
Systém momentálně nemůže danou operaci provést. Zkuste to znovu později.
Články 1–20