-
1
-
-
0002511642
-
An overview of artificial immune system and their applications
-
D. Dasgupta, ed., Springer
-
Dasgupta, D. (1999). "An Overview of Artificial Immune System and Their Applications", Artificial Immune Systems and Their Applications, D. Dasgupta, ed., pp. 3-21, Springer.
-
(1999)
Artificial Immune Systems and Their Applications
, pp. 3-21
-
-
Dasgupta, D.1
-
2
-
-
0003496659
-
An immunological model of distributed detection and its application to computer security
-
PhD dissertation
-
Hofmeyr, S. (1999). "An Immunological Model of Distributed Detection and Its Application to Computer Security", PhD dissertation, Department of Computer Sciences, University of New Mexico.
-
(1999)
Department of Computer Sciences, University of New Mexico
-
-
Hofmeyr, S.1
-
4
-
-
0002467033
-
Architecture for an artificial immune system
-
Hofmeyr, S., and Forrest, S. (1999). "Architecture for an Artificial Immune System", Evolutionary Computation, 7(1):45-68.
-
(1999)
Evolutionary Computation
, vol.7
, Issue.1
, pp. 45-68
-
-
Hofmeyr, S.1
Forrest, S.2
-
5
-
-
33750972259
-
Revisiting LISYS: Parameters and normal behavior
-
Balthrop, J., Forrest, S. and Glickman, M. (2002). "Revisiting LISYS: Parameters and Normal Behavior", Proceedings of the 2002 Congress on Evolutionary Computation, 1045-1050.
-
(2002)
Proceedings of the 2002 Congress on Evolutionary Computation
, pp. 1045-1050
-
-
Balthrop, J.1
Forrest, S.2
Glickman, M.3
-
6
-
-
3543128182
-
Coverage and generalization in an artificial immune system
-
Balthrop, J., Esponda, F., Forrest, S., Glickman, M. (2002). "Coverage and generalization in an Artificial Immune System", Proceedings of the 2002 Genetic and Evolutionary Computation Conference.
-
(2002)
Proceedings of the 2002 Genetic and Evolutionary Computation Conference
-
-
Balthrop, J.1
Esponda, F.2
Forrest, S.3
Glickman, M.4
-
8
-
-
0036613083
-
An immunity-based technique to characterize intrusions in computer network
-
Dasgupta, D., (2002). "An Immunity-Based Technique to Characterize Intrusions in Computer Network", IEEE Transactions on Evolutionary Computation. 6(3): 281-291.
-
(2002)
IEEE Transactions on Evolutionary Computation
, vol.6
, Issue.3
, pp. 281-291
-
-
Dasgupta, D.1
-
9
-
-
0034870039
-
Towards an artificial immune system for network intrusion detection: An investigation of clonal selection with a negative selection operator
-
Kim, J. and Bentley, P. J. (2001), "Towards an Artificial Immune System for Network Intrusion Detection: An Investigation of Clonal Selection with a Negative Selection Operator", Proceedings of the Congress on Evolutionary Computation, pp. 1244-1252.
-
(2001)
Proceedings of the Congress on Evolutionary Computation
, pp. 1244-1252
-
-
Kim, J.1
Bentley, P.J.2
-
11
-
-
1642343496
-
Artificial immunity using constraint-based detectors
-
Hou, H., Zhu, J., and Dozier, G. (2002) "Artificial Immunity using Constraint-based Detectors", Proceedings of the 2002 World Automation Congress, 13:239-244.
-
(2002)
Proceedings of the 2002 World Automation Congress
, vol.13
, pp. 239-244
-
-
Hou, H.1
Zhu, J.2
Dozier, G.3
-
15
-
-
0027961889
-
Self-nonself discrimination in a computer
-
Forrest, S., Perelson, S., Allen, L. and Cherukuri, R. (1994). "Self-nonself discrimination in a computer", Proceeding of the 1994 IEEE Symposium on Research in Security and Privacy, 202-212.
-
(1994)
Proceeding of the 1994 IEEE Symposium on Research in Security and Privacy
, pp. 202-212
-
-
Forrest, S.1
Perelson, S.2
Allen, L.3
Cherukuri, R.4
-
16
-
-
0032155668
-
The distributed constraint satisfaction problem: Formalization and algorithms
-
Yokoo, M., Durfee, E., Ishida, T., Kuwabara, K. (1998). "The Distributed Constraint Satisfaction Problem: Formalization and Algorithms", IEEE Transaction on Knowledge and Data Engineering, 10(5):673-685.
-
(1998)
IEEE Transaction on Knowledge and Data Engineering
, vol.10
, Issue.5
, pp. 673-685
-
-
Yokoo, M.1
Durfee, E.2
Ishida, T.3
Kuwabara, K.4
-
20
-
-
0004181160
-
A comparison of selection schemes used in genetic algorithms
-
Computer Engineering and Communication Networks Lab (TIK), Swiss Federal Institute of Technology (ETH) Zurich, Switzerland
-
Blickle, T. and Thiele, L. (1995) "A Comparison of Selection Schemes used in Genetic Algorithms", TIK Report No. 11, Computer Engineering and Communication Networks Lab (TIK), Swiss Federal Institute of Technology (ETH) Zurich, Switzerland.
-
(1995)
TIK Report No. 11
, vol.11
-
-
Blickle, T.1
Thiele, L.2
-
21
-
-
0002819121
-
A comparative analysis of selection schemes used in genetic algorithms
-
Rawlins, G. ed., Morgan Kaufmann.
-
Goldberg, D. and Deb, K "A Comparative Analysis of Selection Schemes Used in Genetic Algorithms", Foundations of Genetic Algorithms, Rawlins, G. ed., 69-93, Morgan Kaufmann. (1989).
-
(1989)
Foundations of Genetic Algorithms
, pp. 69-93
-
-
Goldberg, D.1
Deb, K.2
-
22
-
-
84858568728
-
-
last accessed on September 1, 2004
-
Cisco Secure, http://www.cisco.com/warp/public/cc/pd/sqsw/sgidsz/, last accessed on September 1, 2004.
-
Cisco Secure
-
-
-
23
-
-
84858562126
-
-
last accessed on September 1, 2004
-
Enterasys Dragon, http://www.enterasys.com/products/ids/, last accessed on September 1, 2004.
-
Enterasys Dragon
-
-
-
24
-
-
84858563029
-
-
last accessed on September 1, 2004
-
NFR, http://www.nfr.com/solutions/, last accessed on September 1, 2004.
-
-
-
-
25
-
-
84858563030
-
-
last accessed on September 1, 2004
-
Snort, http://www.snort.org/, last accessed on September 1, 2004.
-
-
-
-
26
-
-
33745145023
-
-
last accessed on September 1, 2004
-
1998 DARPA Intrusion Detection Evaluation Data Set, http://www.ll.mit. edu/IST/ideval/data/1998/1998_data_index.html, last accessed on September 1, 2004.
-
1998 DARPA Intrusion Detection Evaluation Data Set
-
-
|