RUS  ENG
Full version
JOURNALS // Vestnik Samarskogo Universiteta. Estestvenno-Nauchnaya Seriya

Vestnik Samarskogo Gosudarstvennogo Universiteta. Estestvenno-Nauchnaya Seriya, 2014, Issue 7(118), Pages 207–220 (Mi vsgu442)

Two-classification artificial immune system
M. E. Burlakov

References

1. Puniškis D., Laurutis R., Dirmeikis R., “An Artificial Neural Nets for Spam e-mail Recognition”, Electronics and electrical engineering, 5, Cambridge, 2006
2. Burnet F. M., The Clonal Selection Theory of Acquired Immunity, Cambridge University Press, Cambridge, 1959, 312 pp.
3. Castro L., Timmis J., “An Artificial Immune Network for Multimodal Function Optimization”, Proceedings of IEEE Congress on Evolutionary Computation, CEC'02, v. 1, 2002, 699–674
4. Somayaji A., Hofmeyr S., Forrest S., “Principles of a Computer Immune System”, Proceedings of the Second New Security Paradigms Workshop (1997), 75–82
5. Christodorescu M., Jha S., Kruegel Ch., “Mining specifications of malicious behavior”, Proceedings of the the 6th joint meeting of the European software engineering on The foundations of software engineering (2007), 5–14
6. Ismaila I., Ali S., “A Spam Detection Model Based on Negative Selection Algorithm”, International Journal on Data Mining and Intelligent Information Technology Applications, 2 (2011), 15–17
7. Repository of machine learning databases, http://archive.ics.uci.edu/ml/machine-learning-databases/README (accessed: 02.05.2014)
8. de Castro Leandro N., Timmis J., Artificial Immune Systems: A New Computational Intelligence Approach, Springer, 2004, 273 pp.
9. “An artificial immune system architecture for computer security applications”, IEEE Transactions on Evolutionary Computation http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.113.9398 (accessed: 03.05.2014)
10. A Plan for Spam, http://www.paulgraham.com/spam.html (accessed: 05.05.2014)


© Steklov Math. Inst. of RAS, 2025