Follow
Peter J Bentley
Title
Cited by
Cited by
Year
Evolutionary design by computers
P Bentley
Morgan Kaufmann, 1999
1084*1999
Danger theory: The link between AIS and IDS?
U Aickelin, P Bentley, S Cayzer, J Kim, J McLeod
International conference on artificial immune systems, 147-155, 2003
5182003
Creative evolutionary systems
PJ Bentley, DW Corne
Morgan Kaufmann, 2002
5142002
Immune system approaches to intrusion detection–a review
J Kim, PJ Bentley, U Aickelin, J Greensmith, G Tedesco, J Twycross
Natural computing 6 (4), 413-466, 2007
4122007
An evaluation of negative selection in an artificial immune system for network intrusion detection
J Kim, PJ Bentley
Proceedings of the 3rd Annual Conference on Genetic and Evolutionary …, 2001
4062001
Three ways to grow designs: A comparison of embryogenies for an evolutionary design problem.
PJ Bentley, S Kumar
GECCO 99, 35-43, 1999
4011999
Towards an artificial immune system for network intrusion detection: an investigation of dynamic clonal selection
J Kim, PJ Bentley
Proceedings of the 2002 Congress on Evolutionary Computation. CEC'02 (Cat …, 2002
3782002
Towards an artificial immune system for network intrusion detection: An investigation of clonal selection with a negative selection operator
J Kim, PJ Bentley
Proceedings of the 2001 Congress on Evolutionary Computation (IEEE Cat. No …, 2001
3562001
Finding acceptable solutions in the pareto-optimal range using multiobjective genetic algorithms
PJ Bentley, JP Wakefield
Soft computing in engineering design and manufacturing, 231-240, 1998
3521998
Dynamic search with charged swarms
TM Blackwell, PJ Bentley
Proceedings of the 4th annual conference on genetic and evolutionary …, 2002
2922002
The surprising creativity of digital evolution: A collection of anecdotes from the evolutionary computation and artificial life research communities
J Lehman, J Clune, D Misevic, C Adami, L Altenberg, J Beaulieu, ...
Artificial life 26 (2), 274-306, 2020
2572020
The artificial immune model for network intrusion detection
J Kim, P Bentley
7th European Conference on Intelligent Techniques and Soft Computing (EUFIT …, 1999
2511999
On growth, form and computers
S Kumar, PJ Bentley
Elsevier, 2003
2242003
The human immune system and network intrusion detection
J Kim, P Bentley
7th European Conference on Intelligent Techniques and Soft Computing (EUFIT …, 1999
2241999
Investigating country differences in mobile app user behavior and challenges for software engineering
SL Lim, PJ Bentley, N Kanakam, F Ishikawa, S Honiden
IEEE Transactions on Software Engineering 41 (1), 40-64, 2014
2132014
Don't push me! Collision-avoiding swarms
TM Blackwell, P Bentley
Proceedings of the 2002 Congress on Evolutionary Computation. CEC'02 (Cat …, 2002
1992002
Immune memory in the dynamic clonal selection algorithm
J Kim, PJ Bentley
Proceedings of the First International Conference on Artificial Immune …, 2002
1612002
Particle swarm optimization recommender system
S Ujjin, PJ Bentley
Proceedings of the 2003 IEEE Swarm Intelligence Symposium. SIS'03 (Cat. No …, 2003
1562003
Digital biology: how nature is transforming our technology and our lives
PJ Bentley
Simon and Schuster, 2001
148*2001
Improvised music with swarms
TM Blackwell, P Bentley
Proceedings of the 2002 Congress on Evolutionary Computation. CEC'02 (Cat …, 2002
1422002
The system can't perform the operation now. Try again later.
Articles 1–20