Follow
Peter J Bentley
Title
Cited by
Cited by
Year
Evolutionary design by computers
P Bentley
Morgan Kaufmann, 1999
1091*1999
Danger theory: The link between AIS and IDS?
U Aickelin, P Bentley, S Cayzer, J Kim, J McLeod
International conference on artificial immune systems, 147-155, 2003
5222003
Creative evolutionary systems
PJ Bentley, DW Corne
Morgan Kaufmann, 2002
5172002
Immune system approaches to intrusion detection–a review
J Kim, PJ Bentley, U Aickelin, J Greensmith, G Tedesco, J Twycross
Natural computing 6 (4), 413-466, 2007
4142007
An evaluation of negative selection in an artificial immune system for network intrusion detection
J Kim, PJ Bentley
Proceedings of the 3rd Annual Conference on Genetic and Evolutionary …, 2001
4102001
Three ways to grow designs: A comparison of embryogenies for an evolutionary design problem.
PJ Bentley, S Kumar
GECCO 99, 35-43, 1999
4021999
Towards an artificial immune system for network intrusion detection: an investigation of dynamic clonal selection
J Kim, PJ Bentley
Proceedings of the 2002 Congress on Evolutionary Computation. CEC'02 (Cat …, 2002
3792002
Towards an artificial immune system for network intrusion detection: An investigation of clonal selection with a negative selection operator
J Kim, PJ Bentley
Proceedings of the 2001 Congress on Evolutionary Computation (IEEE Cat. No …, 2001
3562001
Finding acceptable solutions in the pareto-optimal range using multiobjective genetic algorithms
PJ Bentley, JP Wakefield
Soft computing in engineering design and manufacturing, 231-240, 1998
3541998
Dynamic search with charged swarms
TM Blackwell, PJ Bentley
Proceedings of the 4th annual conference on genetic and evolutionary …, 2002
2942002
The surprising creativity of digital evolution: A collection of anecdotes from the evolutionary computation and artificial life research communities
J Lehman, J Clune, D Misevic, C Adami, L Altenberg, J Beaulieu, ...
Artificial life 26 (2), 274-306, 2020
2662020
The artificial immune model for network intrusion detection
J Kim, P Bentley
7th European Conference on Intelligent Techniques and Soft Computing (EUFIT …, 1999
2531999
The human immune system and network intrusion detection
J Kim, P Bentley
7th European Conference on Intelligent Techniques and Soft Computing (EUFIT …, 1999
2251999
On growth, form and computers
S Kumar, PJ Bentley
Elsevier, 2003
2242003
Investigating country differences in mobile app user behavior and challenges for software engineering
SL Lim, PJ Bentley, N Kanakam, F Ishikawa, S Honiden
IEEE Transactions on Software Engineering 41 (1), 40-64, 2014
2182014
Don't push me! Collision-avoiding swarms
TM Blackwell, P Bentley
Proceedings of the 2002 Congress on Evolutionary Computation. CEC'02 (Cat …, 2002
2012002
Immune memory in the dynamic clonal selection algorithm
J Kim, PJ Bentley
Proceedings of the First International Conference on Artificial Immune …, 2002
1632002
Particle swarm optimization recommender system
S Ujjin, PJ Bentley
Proceedings of the 2003 IEEE Swarm Intelligence Symposium. SIS'03 (Cat. No …, 2003
1572003
Digital biology: how nature is transforming our technology and our lives
P Bentley
Simon and Schuster, 2001
148*2001
Improvised music with swarms
TM Blackwell, P Bentley
Proceedings of the 2002 Congress on Evolutionary Computation. CEC'02 (Cat …, 2002
1432002
The system can't perform the operation now. Try again later.
Articles 1–20