-
1
-
-
35248825128
-
Danger theory: The link between AIS and IDS?
-
J. Timmis, P. Bentley, and E. Hart, editors, Proceedings of the end International Conference on Artificial Immune Systems. Springer-Verlag, September
-
U. Aickelin, P. Bentley, S. Cayzer, J. Kim, and J. McLeod.Danger theory: The link between AIS and IDS?In J. Timmis, P. Bentley, and E. Hart, editors, Proceedings of the end International Conference on Artificial Immune Systems, volume 2787 of Lecture Notes in Computer Science, pages 147-155. Springer-Verlag, September 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2787
, pp. 147-155
-
-
Aickelin, U.1
Bentley, P.2
Cayzer, S.3
Kim, J.4
McLeod, J.5
-
3
-
-
1542487517
-
A parallel implementation of the artificial immune system to handle constraints in genetic algorithms: Preliminary results
-
D. B. Fogel, M. A. El-Sharkawi, X. Yao, G. Greenwood, H. Iba, P. Marrow, and M. Shackleton, editors, USA
-
C. A. Coello Coello and N. Cruz Cortés.A parallel implementation of the artificial immune system to handle constraints in genetic algorithms: preliminary results.In D. B. Fogel, M. A. El-Sharkawi, X. Yao, G. Greenwood, H. Iba, P. Marrow, and M. Shackleton, editors, Proceedings of the 2002 Congress on Evolutionary Computation CEC2002, pages 819-824, USA, 2002.
-
(2002)
Proceedings of the 2002 Congress on Evolutionary Computation CEC2002
, pp. 819-824
-
-
Coello Coello, C.A.1
Cruz Cortés, N.2
-
6
-
-
0008656059
-
Tool breakage detection in milling operations using a negative-selection algorithm
-
Department of Computer Science, University of New Mexico
-
D. Dasgupta and S. Forrest.Tool breakage detection in milling operations using a negative-selection algorithm.Technical Report CS95-5, Department of Computer Science, University of New Mexico, 1995.
-
(1995)
Technical Report
, vol.CS95-5
-
-
Dasgupta, D.1
Forrest, S.2
-
7
-
-
0012021893
-
Novelty detection in time series data using ideas from immunology
-
J. F. C. Harris, editor, Gary, NC, June. ISCA
-
D. Dasgupta and S. Forrest.Novelty detection in time series data using ideas from immunology.In J. F. C. Harris, editor, Proceedings of the 5th International Conference on Intelligent Systems, pages 82-87, Gary, NC, June 1996. ISCA.
-
(1996)
Proceedings of the 5th International Conference on Intelligent Systems
, pp. 82-87
-
-
Dasgupta, D.1
Forrest, S.2
-
8
-
-
0003385618
-
An anomaly detection algorithm inspired by the immune system
-
D. Dasgupta, editor. Springer-Verlag, New York
-
D. Dasgupta and S. Forrest.An anomaly detection algorithm inspired by the immune system.In D. Dasgupta, editor, Artificial immune systems and their applications, pages 262-277. Springer-Verlag, New York, 1999.
-
(1999)
Artificial Immune Systems and Their Applications
, pp. 262-277
-
-
Dasgupta, D.1
Forrest, S.2
-
10
-
-
0029718285
-
An immunological approach to change detection: Algorithms, analysis and implications
-
J. McHugh and G. Dinolt, editors, USA. IEEE Press
-
P. D'haeseleer, S. Forrest, and P. Helman.An immunological approach to change detection: algorithms, analysis and implications.In J. McHugh and G. Dinolt, editors, Proceedings of the 1996 IEEE Symposium on Computer Security and Privacy pages 110-119, USA, 1996. IEEE Press.
-
(1996)
Proceedings of the 1996 IEEE Symposium on Computer Security and Privacy
, pp. 110-119
-
-
D'haeseleer, P.1
Forrest, S.2
Helman, P.3
-
12
-
-
0027961889
-
Self-nonself discrimination in a computer
-
Los Alamitos, CA. IEEE Computer Society Press
-
S. Forrest, A. Perelson, L. Allen, and R. Cherukuri.Self-nonself discrimination in a computer.In Proceedings IEEE Symposium on Research in Security and Privacy, pages 202-212, Los Alamitos, CA, 1994. IEEE Computer Society Press.
-
(1994)
Proceedings IEEE Symposium on Research in Security and Privacy
, pp. 202-212
-
-
Forrest, S.1
Perelson, A.2
Allen, L.3
Cherukuri, R.4
-
15
-
-
84901440662
-
Combining negative selection and classification techniques for anomaly detection
-
D. B. Fogel, M. A. El-Sharkawi, X. Yao, G. Greenwood, H. Iba, P. Marrow, and M. Shackleton, editors, USA, May. IEEE Press
-
F. González, D. Dasgupta, and R. Kozma.Combining negative selection and classification techniques for anomaly detection.In D. B. Fogel, M. A. El-Sharkawi, X. Yao, G. Greenwood, H. Iba, P. Marrow, and M. Shackleton, editors, Proceedings of the 2002 Congress on Evolutionary Computation CEC2002, pages 705-710, USA, May 2002. IEEE Press.
-
(2002)
Proceedings of the 2002 Congress on Evolutionary Computation CEC2002
, pp. 705-710
-
-
González, F.1
Dasgupta, D.2
Kozma, R.3
-
16
-
-
35248816526
-
A randomized real-valued negative selection algorithm
-
J. Timmis, P. Bentley, and E. Hart, editors, Proceedings of the 2nd International Conference on Artificial Immune Systems. Springer, September
-
F. González, D. Dasgupta, and F. Niño.A randomized real-valued negative selection algorithm.In J. Timmis, P. Bentley, and E. Hart, editors, Proceedings of the 2nd International Conference on Artificial Immune Systems, volume 2787 of Lecture Notes in Computer Science, pages 261-272. Springer, September 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2787
, pp. 261-272
-
-
González, F.1
Dasgupta, D.2
Niño, F.3
-
17
-
-
0036613003
-
An artificial immune system architecture for computer security applications
-
June
-
P. Harmer, G. Williams, P.D.and Gnusch, and G. Lamont.An Artificial Immune System Architecture for Computer Security Applications.IEEE Transactions on Evolutionary Computation, 6(3):252-280, June 2002.
-
(2002)
IEEE Transactions on Evolutionary Computation
, vol.6
, Issue.3
, pp. 252-280
-
-
Harmer, P.1
Williams, G.2
Gnusch, P.D.3
Lamont, G.4
-
19
-
-
0034546374
-
Architecture for an artificial immune ayatem
-
S. Hofmeyr and S. Forrest.Architecture for an artificial immune ayatem.Evolutionary Computation, 8(4):443-473, 2000.
-
(2000)
Evolutionary Computation
, vol.8
, Issue.4
, pp. 443-473
-
-
Hofmeyr, S.1
Forrest, S.2
-
20
-
-
0015956495
-
Towards a network theory of the immune system
-
N. K. Jerne.Towards a network theory of the immune system.Ann Immunol. (Inst. Pasteur), 125C:373-389, 1974.
-
(1974)
Ann Immunol. (Inst. Pasteur)
, vol.125 C
, pp. 373-389
-
-
Jerne, N.K.1
-
21
-
-
0002606747
-
A biologically inspired immune system for computers
-
R. A. Brooks and P. Maes, editors, Cambridge, MA, USA, July. MIT Press
-
J. O. Kephart.A biologically inspired immune system for computers.In R. A. Brooks and P. Maes, editors, Proceedings of the 4th International Workshop on the Synthesis and Simulation of Living Systems Artificial LifeIV, pages 130-139, Cambridge, MA, USA, July 1994. MIT Press.
-
(1994)
Proceedings of the 4th International Workshop on the Synthesis and Simulation of Living Systems Artificial LifeIV
, pp. 130-139
-
-
Kephart, J.O.1
-
22
-
-
0003209045
-
Self-organizing maps
-
Springer, Berlin, Heidelberg. (Second Extended Edition 1997)
-
T. Kohonen.Self-Organizing Maps, volume 30 of Springer Series in Information Sciences.Springer, Berlin, Heidelberg, 1995. (Second Extended Edition 1997).
-
(1995)
Springer Series in Information Sciences
, vol.30
-
-
Kohonen, T.1
-
23
-
-
32444432081
-
A novel visualization technique for network anomaly detection
-
New Brunswick, Canada, oct
-
I.-V. Onut, B. Zhu, and A. A. Ghorbani. A novel visualization technique for network anomaly detection.In Proceedings of the Second Annual Conference on Privacy, Security and Trust (PST'04), New Brunswick, Canada, oct 2004.
-
(2004)
Proceedings of the Second Annual Conference on Privacy, Security and Trust (PST'04)
-
-
Onut, I.-V.1
Zhu, B.2
Ghorbani, A.A.3
-
24
-
-
33847784407
-
A danger theory approach to web mining
-
J. Timmis, P. Bentley, and E. Hart, editors, Proceedings of the end International Conference on Artificial Immune Systems. Springer-Verlag, September
-
A. Secker, A. Freitas, and J. Timmis.A danger theory approach to web mining.In J. Timmis, P. Bentley, and E. Hart, editors, Proceedings of the end International Conference on Artificial Immune Systems, volume 2787 of Lecture Notes in Computer Science, pages 156-167. Springer-Verlag, September 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2787
, pp. 156-167
-
-
Secker, A.1
Freitas, A.2
Timmis, J.3
-
25
-
-
32444445662
-
Visual data analysis for detecting flaws and intruders in computer network systems
-
Sep/Oct
-
S. T. Teoh, T. J. Jankun-Kelly, K.-L. Ma, and S. F. Wu.Visual data analysis for detecting flaws and intruders in computer network systems.IEEE Computer Graphics and Applications, 24(5), Sep/Oct 2004.
-
(2004)
IEEE Computer Graphics and Applications
, vol.24
, Issue.5
-
-
Teoh, S.T.1
Jankun-Kelly, T.J.2
Ma, K.-L.3
Wu, S.F.4
-
27
-
-
84947551624
-
CDIS: Towards a computer immune system for detecting network intrusions
-
P. D. Williams, K. P. Anchor, J. L. Bebo, G. H. Gunsch, and G. D. Lamont.CDIS: Towards a computer immune system for detecting network intrusions. Lecture Notes in Computer Science, 2212:117-133, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2212
, pp. 117-133
-
-
Williams, P.D.1
Anchor, K.P.2
Bebo, J.L.3
Gunsch, G.H.4
Lamont, D.G.5
|