“…After a quite complex modeling phase, AIS have been successfully applied to various fields of digital knowledge, including optimization theory [29], data analysis [30], image recognition [31], and computer security [32]. More specifically, AIS-based proposals have arisen to solve cybersecurity challenges for anomaly detection, intrusion detection, malicious process detection, scan and flood detection, and fraud detection, among others [33], [34], [35], [36] others. Those proposals rely on the capabilities of four main bio-inspired techniques, namely, negative selection, clonal section, artificial immune networks, and Danger Theory [28], [37], [38].…”