Follow
Peter J Bentley
Title
Cited by
Cited by
Year
Evolutionary design by computers
P Bentley
Morgan Kaufmann, 1999
1162*1999
Creative evolutionary systems
DW Corne, PJ Bentley
Elsevier, 2001
5552001
Danger theory: The link between AIS and IDS?
U Aickelin, P Bentley, S Cayzer, J Kim, J McLeod
Artificial Immune Systems: Second International Conference, ICARIS 2003 …, 2003
5262003
Immune system approaches to intrusion detection–a review
J Kim, PJ Bentley, U Aickelin, J Greensmith, G Tedesco, J Twycross
Natural computing 6, 413-466, 2007
4282007
Three ways to grow designs: A comparison of embryogenies for an evolutionary design problem.
PJ Bentley, S Kumar
GECCO 99, 35-43, 1999
4151999
An evaluation of negative selection in an artificial immune system for network intrusion detection
J Kim, PJ Bentley
Proceedings of the 3rd Annual Conference on Genetic and Evolutionary …, 2001
4122001
Towards an artificial immune system for network intrusion detection: an investigation of dynamic clonal selection
J Kim, PJ Bentley
Proceedings of the 2002 Congress on Evolutionary Computation. CEC'02 (Cat …, 2002
3792002
Finding acceptable solutions in the pareto-optimal range using multiobjective genetic algorithms
PJ Bentley, JP Wakefield
Soft computing in engineering design and manufacturing, 231-240, 1998
3711998
The surprising creativity of digital evolution: A collection of anecdotes from the evolutionary computation and artificial life research communities
J Lehman, J Clune, D Misevic, C Adami, L Altenberg, J Beaulieu, ...
Artificial life 26 (2), 274-306, 2020
3622020
Towards an artificial immune system for network intrusion detection: An investigation of clonal selection with a negative selection operator
J Kim, PJ Bentley
Proceedings of the 2001 Congress on Evolutionary Computation (IEEE Cat. No …, 2001
3602001
Dynamic search with charged swarms
TM Blackwell, PJ Bentley
Proceedings of the 4th annual conference on genetic and evolutionary …, 2002
3062002
Investigating country differences in mobile app user behavior and challenges for software engineering
SL Lim, PJ Bentley, N Kanakam, F Ishikawa, S Honiden
IEEE Transactions on Software Engineering 41 (1), 40-64, 2014
2672014
The artificial immune model for network intrusion detection
J Kim, P Bentley
7th European Conference on Intelligent Techniques and Soft Computing (EUFIT …, 1999
2571999
On growth, form and computers
S Kumar, PJ Bentley
Elsevier, 2003
2312003
The human immune system and network intrusion detection
J Kim, P Bentley
7th European Conference on Intelligent Techniques and Soft Computing (EUFIT …, 1999
2251999
Immune memory in the dynamic clonal selection algorithm
J Kim, PJ Bentley
Proceedings of the First International Conference on Artificial Immune …, 2002
200*2002
Don't push me! Collision-avoiding swarms
TM Blackwell, P Bentley
Proceedings of the 2002 Congress on Evolutionary Computation. CEC'02 (Cat …, 2002
1952002
Particle swarm optimization recommender system
S Ujjin, PJ Bentley
Proceedings of the 2003 IEEE Swarm Intelligence Symposium. SIS'03 (Cat. No …, 2003
1652003
Improvised music with swarms
TM Blackwell, P Bentley
Proceedings of the 2002 Congress on Evolutionary Computation. CEC'02 (Cat …, 2002
1582002
Digital biology: how nature is transforming our technology and our lives
P Bentley
Simon and Schuster, 2001
158*2001
The system can't perform the operation now. Try again later.
Articles 1–20