[1] PRASHANT K,MAMTA B.Artificial immune system:state of the art approach[J].International Journal of Computer Applications,2015,120(20):25-32. [2] TAN Y.Artificial immune system applications in computersecurity[M].Hoboken,USA:John Wiley & Sons,Inc.,2016. [3] MATZINGER P.Tolerance,danger,and the extended family[J].Annual Review of Immunology,1994,12:991-1045. [4] ŞAHIN C B.DCW-RNN:improving class level metrics for software vulnerability detection using artificial immune system with clock-work recurrent neural network[C]//Proceedings of International Conference on Innovations in Intelligent Systems and Applications.Washington D.C.,USA:IEEE Press,2021:1-8. [5] PINTO R,GONÇALVES G,DELSING J,et al. Incremental dendritic cell algorithm for intrusion detection in cyber-physical production systems[M]//KACPRZYK J. Lecture notes in networks and systems.Berlin,Germany:Springer,2021:664-680. [6] SHARAFF A,KAMAL C,PORWAL S,et al.Spam message detection using danger theory and Krill herd optimization[J].Computer Networks,2021,199:108453. [7] ARORA K,MAHAJAN S.Detecting denial-of-service attack using dendritic cell approach[C]//Proceedings of the 2nd International Conference on Information Management and Machine Intelligence.Berlin,Germany:Springer,2021:509-516. [8] JUNEJA K.MPMFFT based DCA-DBT integrated probabilistic model for face expression classification[J].Journal of King Saud University-Computer and Information Sciences,2020,32(5):618-633. [9] 周天祥,董红斌,周雯.基于区域分割的混合地震预测算法[J].计算机工程,2019,45(9):310-315. ZHOU T X,DONG H B,ZHOU W.Hybrid algorithm based on region segmentation for earthquake prediction[J].Computer Engineering,2019,45(9):310-315.(in Chinese) [10] DIEZ-OLIVAN A,ORTEGO P,DEL SER J,et al.Adaptive dendritic cell-deep learning approach for industrial prognosis under changing conditions[J].IEEE Transactions on Industrial Informatics,2021,17(11):7760-7770. [11] GU F,GREENSMITH J,OATES R,et al.PCA 4 DCA:the application of principal component analysis to the dendritic cell algorithm[EB/OL].[2022-01-05].https://arxiv.org/ftp/arxiv/papers/1004/1004.3460.pdf. [12] 杨信民,董红斌,谭成予,等.采用奇异值分解和信息增益的树突状细胞模型[J].计算机工程与应用,2021,57(15):156-162. YANG X M,DONG H B,TAN C Y,et al.Dendritic cell model using singular value decomposition and information gain[J].Computer Engineering and Applications,2021,57(15):156-162.(in Chinese) [13] CHELLY Z,ELOUEDI Z.A study of the data pre-processing module of the dendritic cell evolutionary algorithm[C]//Proceedings of International Conference on Control,Decision and Information Technologies.Washington D.C.,USA:IEEE Press,2014:634-639. [14] MOHSIN M F M,HAMDAN A R,ABU BAKAR A.An evaluation of feature selection technique for dendrite cell algorithm[C]//Proceedings of International Conference on IT Convergence and Security.Washington D.C.,USA:IEEE Press,2015:1-5. [15] CHELLY Z,ELOUEDI Z.A survey of the dendritic cell algorithm[J].Knowledge and Information Systems,2016,48(3):505-535. [16] GREENSMITH J,AICKELIN U,CAYZER S.Introducing dendritic cells as a novel immune-inspired algorithm for anomaly detection[C]//Proceedings of the 4th International Conference on Artificial Immune Systems.Berlin,Germany:Springer,2005:153-167. [17] GU F,GREENSMITH J,AICKLEIN U.The dendritic cell algorithm for intrusion detection[EB/OL].[2022-01-05].https://arxiv.org/ftp/arxiv/papers/1305/1305.7416.pdf. [18] GU F,GREENSMITH J,AICKELIN U.Further exploration of the dendritic cell algorithm:antigen multiplier and time windows[C]//Proceedings of the 7th International Conference on Artificial Immune Systems.Berlin,Germany:Springer,2008:142-153. [19] ELISA N,CHAO F,YANG L Z.A study of the necessity of signal categorisation in dendritic cell algorithm[C]//Proceedings of Advances in Intelligent Systems and Computing.Berlin,Germany:Springer,2019:210-220. [20] 朱文峰,于舒娟,何伟.基于IGCDmRMR的二阶段特征选择方法[J].计算机工程,2019,45(9):183-187,193. ZHU W F,YU S J,HE W.Two-stage feature selection method based on IGCDmRMR[J].Computer Engineering,2019,45(9):183-187,193.(in Chinese) [21] RAY P,REDDY S,BANERJEE T.Various dimension reduction techniques for high dimensional data analysis:a review[J].Artificial Intelligence Review,2021,54(5):3473-3515. [22] GORDON A D,BREIMAN L,FRIEDMAN J H,et al.Classification and regression trees[J].Biometrics,1984,40(3):874. [23] NEMBRINI S,KÖNIG I R,WRIGHT M N.The revival of the Gini importance?[J].Bioinformatics,2018,34(21):3711-3718. [24] REIS B,MAIA E,PRAÇA I.Selection and performance analysis of CICIDS2017 features importance[C]//Proceedings of International Symposium on Foundations and Practice of Security.Berlin,Germany:Springer,2019:56-71. [25] COVER T M.The best two independent measurements are not the two best[J].IEEE Transactions on Systems,Man,and Cybernetics,1974,1:116-117. [26] PIRBAZARI A M,CHAKRAVORTY A,RONG C M.Evaluating feature selection methods for short-term load forecasting[C]//Proceedings of International Conference on Big Data and Smart Computing (BigComp).Washington D.C.,USA:IEEE Press,2019:1-8. [27] SAZZED S.An investigation of the performances of simple gene selection methodologies for cancer classification[C]//Proceedings of the 21st International Conference on Bioinformatics and Bioengineering.Washington D.C.,USA:IEEE Press,2021:1-6. [28] ZHAO Z Y,ANAND R,WANG M.Maximum relevance and minimum redundancy feature selection methods for a marketing machine learning platform[C]//Proceedings of International Conference on Data Science and Advanced Analytics.Washington D.C.,USA.IEEE Press,2020:442-452. [29] GU F,GREENSMITH J,AICKELIN U.Theoretical formulation and analysis of the deterministic dendritic cell algorithm[J].Biosystems,2013,111(2):127-135. [30] SANI H M,LEI C,NEAGU D.Computational complexity analysis of decision tree algorithms[C]//Proceedings of International Conference on Innovative Techniques and Applications of Artificial Intelligence.Berlin,Germany:Springer,2018:191-197. [31] ABDIANSAH A,WARDOYO R.Time complexity analysis of Support Vector Machines (SVM) in LibSVM[J].International Journal of Computer Applications,2015,128(3):28-34. [32] DUA,D.AND GRAFF,C.UCI machine learning repository[EB/OL].[2022-01-05].https://archive.ics.uci.edu/ml/index.php. [33] LI J D,CHENG K W,WANG S H,et al.Feature selection[J].ACM Computing Surveys,2018,50(6):1-45. [34] HETTICH S,BAY S D.The UCI KDD archive[EB/OL].[2022-01-05].http://kdd.ics.uci.edu/databases/kddcup99/. [35] KAYACIK H G,ZINCIR-HEYWOOD A N,HEYWOOD M I.Selecting features for intrusion detection:a feature relevance analysis on KDD 99 intrusion detection datasets[C]//Proceedings of the 3rd Annual Conference on Privacy,Security and Trust.Washington D.C.,USA:IEEE Press, 2005:1723-1722. |