-
1
-
-
0034541756
-
"Mitigating routing misbehavior in mobile ad hoc networks"
-
S. Marti, T. J. Giuli, K. Lai, and M. Baker, "Mitigating routing misbehavior in mobile ad hoc networks," in Proc. MOBICOM '00, 2000, pp. 255-265.
-
(2000)
Proc. MOBICOM '00
, pp. 255-265
-
-
Marti, S.1
Giuli, T.J.2
Lai, K.3
Baker, M.4
-
2
-
-
15344340908
-
"A robust reputation system for mobile ad hoc networks"
-
Lausanne, Switzerland, Tech. Rep. IC/2003/50, EPFL-DI-ICA, Jul.
-
S. Buchegger and J.-Y. Le Boudec, "A robust reputation system for mobile ad hoc networks,", Lausanne, Switzerland, Tech. Rep. IC/2003/ 50, EPFL-DI-ICA, Jul. 2003.
-
(2003)
-
-
Buchegger, S.1
Le Boudec, J.-Y.2
-
3
-
-
0242696192
-
"Performance analysis of the CONFIDANT protocol: Cooperation of nodes - Fairness in distributed ad hoc networks"
-
Lausanne, Switzerland, Jun.
-
S. Buchegger and J.-Y. Le Boudec, "Performance analysis of the CONFIDANT protocol: Cooperation of nodes - Fairness in distributed ad hoc networks," in Proc. IEEE/ACM Symp. Mobile Ad hoc Networking and Computing (MobiHOC), Lausanne, Switzerland, Jun. 2002, pp. 80-91.
-
(2002)
Proc. IEEE/ACM Symp. Mobile Ad Hoc Networking and Computing (MobiHOC)
, pp. 80-91
-
-
Buchegger, S.1
Le Boudec, J.-Y.2
-
4
-
-
11244250305
-
"The effect of rumor spreading in reputation systems for mobile ad hoc networks"
-
Sophia-Antipolis, France, Mar.
-
S. Buchegger and J.-Y. Le Boudec, "The effect of rumor spreading in reputation systems for mobile ad hoc networks" in Proc. WiOpt'03: Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks, Sophia-Antipolis, France, Mar. 2003, pp. 131-140.
-
(2003)
Proc. WiOpt'03: Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks
, pp. 131-140
-
-
Buchegger, S.1
Le Boudec, J.-Y.2
-
5
-
-
26844438249
-
"An artificial immune system approach to misbehavior detection in mobile ad hoc networks"
-
Lausanne, Switzerland, Tech. Rep. IC/2003/59, EPFL-DI-ICA, Sep.
-
J. Y. Le Boudec and S. Sarafijanovic, "An artificial immune system approach to misbehavior detection in mobile ad hoc networks", Lausanne, Switzerland, Tech. Rep. IC/2003/59, EPFL-DI-ICA, Sep. 2003.
-
(2003)
-
-
Le Boudec, J.Y.1
Sarafijanovic, S.2
-
6
-
-
35048854187
-
"An artificial immune system for misbehavior detection in mobile ad hoc networks with virtual thymus, clustering, danger signal and memory detectors"
-
Catania, Italy, Sep.
-
S. Sarafijanovic and J. Y. Le Boudec, "An artificial immune system for misbehavior detection in mobile ad hoc networks with virtual thymus, clustering, danger signal and memory detectors," in Proc. ICARIS'04 3rd Int. Conf. Artificial Immune Systems, Catania, Italy, Sep. 2004, pp. 342-356.
-
(2004)
Proc. ICARIS'04 3rd Int. Conf. Artificial Immune Systems
, pp. 342-356
-
-
Sarafijanovic, S.1
Le Boudec, J.Y.2
-
7
-
-
0003496659
-
"An immunological model of distributed detection and it's application to computer security"
-
Ph.D. dissertation, Dept. Comput. Sci., Univ. New Mexico, Apr.
-
S. A. Hofmeyr, "An immunological model of distributed detection and it's application to computer security," Ph.D. dissertation, Dept. Comput. Sci., Univ. New Mexico, Apr. 1999.
-
(1999)
-
-
Hofmeyr, S.A.1
-
8
-
-
0002467033
-
"Architecture for an artificial immune system"
-
S. A. Hofmeyr and S. Forrest, "Architecture for an artificial immune system," Evolut. Computat., vol. 7, no. 1, pp. 45-68, 2000.
-
(2000)
Evolut. Computat.
, vol.7
, Issue.1
, pp. 45-68
-
-
Hofmeyr, S.A.1
Forrest, S.2
-
9
-
-
0038458266
-
"Evaluating negative selection in an artificial immune system for network intrusion detection"
-
San Francisco, CA, Jul. 7-11
-
J. Kim and P. J. Bentley, "Evaluating negative selection in an artificial immune system for network intrusion detection" in Proc. Genetic and Evolutionary Computation Conf. (GECCO'01), San Francisco, CA, Jul. 7-11, pp. 1330-1337.
-
Proc. Genetic and Evolutionary Computation Conf. (GECCO'01)
, pp. 1330-1337
-
-
Kim, J.1
Bentley, P.J.2
-
10
-
-
0034870039
-
"The artificial immune system for network intrusion detection: An investigation of clonal selection with negative selection operator"
-
May 27-30
-
J. Kim and P. J. Bentley, "The artificial immune system for network intrusion detection: An investigation of clonal selection with negative selection operator," Proc. Cong. Evolutionary Computation (CEC'01), pp. 1244-1252, May 27-30.
-
Proc. Cong. Evolutionary Computation (CEC'01)
, pp. 1244-1252
-
-
Kim, J.1
Bentley, P.J.2
-
11
-
-
84901408225
-
"Toward an artificial immune system for network intrusion detection: An investigation of dynamic clonal selection"
-
May 12-17
-
J. Kim and P. J. Bentley, "Toward an artificial immune system for network intrusion detection: An investigation of dynamic clonal selection," Proc. Congr. Evolutionary Computation (CEC'02), pp. 1015-1020, May 12-17, 2002.
-
(2002)
Proc. Congr. Evolutionary Computation (CEC'02)
, pp. 1015-1020
-
-
Kim, J.1
Bentley, P.J.2
-
12
-
-
9444238520
-
"Immune memory in the dynamic clonal selection algorithm"
-
Canterbury, Sep. 9-11
-
J. Kim and P. J. Bentley, "Immune memory in the dynamic clonal selection algorithm," in Proc. 1st Int. Conf. Artificial Immune Systems (ICARIS), Canterbury, Sep. 9-11, 2002, pp. 57-65.
-
(2002)
Proc. 1st Int. Conf. Artificial Immune Systems (ICARIS)
, pp. 57-65
-
-
Kim, J.1
Bentley, P.J.2
-
13
-
-
0028201732
-
"Tolerance, danger and the extended family"
-
P. Matzinger, "Tolerance, danger and the extended family," Annu. Rev. Immunology, vol. 12, pp. 991-1045, 1994.
-
(1994)
Annu. Rev. Immunology
, vol.12
, pp. 991-1045
-
-
Matzinger, P.1
-
14
-
-
0034956209
-
"The danger model in it's historical contex"
-
P. Matzinger, "The danger model in it's historical contex," Scandinavian J. Immunology, vol. 54, pp. 4-9, 2001.
-
(2001)
Scandinavian J. Immunology
, vol.54
, pp. 4-9
-
-
Matzinger, P.1
-
16
-
-
0141991983
-
"Order from disorder sprung: Recognition and regulation in the immune system"
-
May
-
T. W. Mak, "Order from disorder sprung: Recognition and regulation in the immune system," Phil. Trans. R. Soc. Lond. A, vol. 361, pp. 1235-1250, May 2003.
-
(2003)
Phil. Trans. R. Soc. Lond. A
, vol.361
, pp. 1235-1250
-
-
Mak, T.W.1
-
17
-
-
0031652485
-
"Glomosim: A library for parallel simulation of large scale wireless networks"
-
Banff, AB, Canada, May 26-29
-
X. Zeng, R. Bagrodia, and M. Gerla, "Glomosim: A library for parallel simulation of large scale wireless networks," in Proc. 12th Workshop on Parallel and Distributed Simulations (PDAS'98), Banff, AB, Canada, May 26-29, 1998, pp. 154-161.
-
(1998)
Proc. 12th Workshop on Parallel and Distributed Simulations (PDAS'98)
, pp. 154-161
-
-
Zeng, X.1
Bagrodia, R.2
Gerla, M.3
-
19
-
-
0141539299
-
"Analysis of link failures in an IP backbone"
-
Marseille, France, Nov.
-
G. Iannaccone, C.-N. Chuah, R. Mortier, S. Bhattacharyya, and C. Diot, "Analysis of link failures in an IP backbone," in Proc. IMW'02, Marseille, France, Nov. 2002, pp. 237-242.
-
(2002)
Proc. IMW'02
, pp. 237-242
-
-
Iannaccone, G.1
Chuah, C.-N.2
Mortier, R.3
Bhattacharyya, S.4
Diot, C.5
-
20
-
-
0004125427
-
"Artificial immune systems: Part I basic theory and applications"
-
Tech. Rep. RT DCA 01/99
-
L. N. De Castro and F. J. Von Zuben, "Artificial immune systems: Part I basic theory and applications,", Tech. Rep. RT DCA 01/99, 1999.
-
(1999)
-
-
De Castro, L.N.1
Von Zuben, F.J.2
-
22
-
-
0036613083
-
"An immunity-based technique to characterize intrusions in computer networks"
-
Jun.
-
D. Dasgupta and F. González, "An immunity-based technique to characterize intrusions in computer networks," IEEE Trans. Evol. Comput., vol. 6, no. 9, pp. 1081-1088, Jun. 2002.
-
(2002)
IEEE Trans. Evol. Comput.
, vol.6
, Issue.9
, pp. 1081-1088
-
-
Dasgupta, D.1
González, F.2
-
23
-
-
85084164032
-
"Automated Response Using System-Call Delays"
-
Denver, CO, Aug.
-
A. Somayaji and S. Forrest, "Automated Response Using System-Call Delays," in Proc. 9th USENIX Security Symp., Denver, CO, Aug. 2000, pp. 185-197.
-
(2000)
Proc. 9th USENIX Security Symp.
, pp. 185-197
-
-
Somayaji, A.1
Forrest, S.2
|