-
2
-
-
24144447453
-
-
Beijing: Publishing House of Electronics Industry
-
Li, T., Computer Immunology, Beijing: Publishing House of Electronics Industry, 2004.
-
(2004)
Computer Immunology
-
-
Li, T.1
-
3
-
-
71649110512
-
Artificial immune systems as a novel soft computing paradigm
-
de Castro, L. N., Timmis, J. I., Artificial immune systems as a novel soft computing paradigm, Soft Computing Journal, 2003, 7(8): 526-544.
-
(2003)
Soft Computing Journal
, vol.7
, Issue.8
, pp. 526-544
-
-
De Castro, L.N.1
Timmis, J.I.2
-
4
-
-
85028857450
-
An overview of evolutionary computation
-
Springer Verlag
-
Spears, W. M., De Jong, K. A., An overview of evolutionary computation, Proc. of the European Conf. on Machine Learning, Springer Verlag, 1993, 667: 442-459.
-
(1993)
Proc. of the European Conf. on Machine Learning
, vol.667
, pp. 442-459
-
-
Spears, W.M.1
De Jong, K.A.2
-
6
-
-
33744816550
-
An immunity based network security risk estimation
-
Li, T., An immunity based network security risk estimation, Science in China, Ser. F, 2005, 48(5).
-
(2005)
Science in China, Ser. F
, vol.48
, Issue.5
-
-
Li, T.1
-
7
-
-
3142752196
-
Development and prospect of the artificial immune system
-
Jiao, L., Du, H., Development and prospect of the artificial immune system, Acta Electronica Sinica, 2003, 31(10): 1540-1548.
-
(2003)
Acta Electronica Sinica
, vol.31
, Issue.10
, pp. 1540-1548
-
-
Jiao, L.1
Du, H.2
-
8
-
-
0037910212
-
Artificial immune system: Principle, models, analysis and perspectives
-
Xiao, R., Wang, L., Artificial immune system: principle, models, analysis and perspectives, Chinese Journal of Computers, 2002, 25(12): 1281-1293.
-
(2002)
Chinese Journal of Computers
, vol.25
, Issue.12
, pp. 1281-1293
-
-
Xiao, R.1
Wang, L.2
-
9
-
-
0027961889
-
Self-nonself discrimination in a computer
-
Oakland, CA: IEEE Computer Society Press
-
Forrest, S., Perelson, A. S., Self-nonself discrimination in a computer, in IEEE Symposium on Security and Privacy, Oakland, CA: IEEE Computer Society Press, 1994, 202-213.
-
(1994)
IEEE Symposium on Security and Privacy
, pp. 202-213
-
-
Forrest, S.1
Perelson, A.S.2
-
10
-
-
0031258214
-
Computer immunology
-
Forrest, S., Hofmeyr, S., Somayaji, A., Computer immunology, Communications of the ACM, 1997, 40(10): 88-96.
-
(1997)
Communications of the ACM
, vol.40
, Issue.10
, pp. 88-96
-
-
Forrest, S.1
Hofmeyr, S.2
Somayaji, A.3
-
11
-
-
0002320533
-
Immunity by design: An artificial immune system
-
San Francisco, CA: IEEE Press
-
Hofmeyr, S., Forrest, S., Immunity by design: An artificial immune system, in Genetic Evolutionary Computation Conf., San Francisco, CA: IEEE Press, 1999, 1289-1296.
-
(1999)
Genetic Evolutionary Computation Conf.
, pp. 1289-1296
-
-
Hofmeyr, S.1
Forrest, S.2
-
12
-
-
0034546374
-
Architecture for an artificial immune system
-
Hofmeyr, S., Forrest, S., Architecture for an artificial immune system, Evolutionary Computation, 2000, 8(4): 443-473.
-
(2000)
Evolutionary Computation
, vol.8
, Issue.4
, pp. 443-473
-
-
Hofmeyr, S.1
Forrest, S.2
-
13
-
-
2642548686
-
Immunity-based intrusion detection system: A general framework
-
Crystal City, VA: CISSE
-
Dasgupta, D., Immunity-based intrusion detection system: A general framework, in The 22nd National Information Systems Security Conf., Crystal City, VA: CISSE, 1999, 147-160.
-
(1999)
The 22nd National Information Systems Security Conf.
, pp. 147-160
-
-
Dasgupta, D.1
-
14
-
-
0036613003
-
An artificial immune system architecture for computer security applications
-
Harmer, P. K., Williams, P. D., Gunsch, G. H. et al., An artificial immune system architecture for computer security applications, IEEE Transaction on Evolutionary Computation, 2002, 6(3): 252-280.
-
(2002)
IEEE Transaction on Evolutionary Computation
, vol.6
, Issue.3
, pp. 252-280
-
-
Harmer, P.K.1
Williams, P.D.2
Gunsch, G.H.3
-
15
-
-
0029718285
-
An immunological approach to change detection: Algorithm, analysis and implication
-
Oakland, CA: IEEE Computer Society Press
-
D'haeseleer, P., Forrest, S., An immunological approach to change detection: Algorithm, analysis and implication, in IEEE Symposium on Research in Security and Privacy, Oakland, CA: IEEE Computer Society Press, 1996, 110-119.
-
(1996)
IEEE Symposium on Research in Security and Privacy
, pp. 110-119
-
-
D'Haeseleer, P.1
Forrest, S.2
-
16
-
-
84901408225
-
Towards an artificial immune system for network intrusion detection: An investigation of dynamic clonal selection
-
Honolulu: IEEE Press
-
Kim, J., Bentley, P. J., Towards an artificial immune system for network intrusion detection: An investigation of dynamic clonal selection, in The Congress on Evolutionary Computation (CEC-2002), Honolulu: IEEE Press, 2002, 1015-1020.
-
(2002)
The Congress on Evolutionary Computation (CEC-2002)
, pp. 1015-1020
-
-
Kim, J.1
Bentley, P.J.2
-
17
-
-
33749856978
-
A new model of intrusion detection based on artificial immune theory
-
Liang, K. X., Li, T., A new model of intrusion detection based on artificial immune theory, Computer Engineering and Applications, 2005, 41(2): 129-132.
-
(2005)
Computer Engineering and Applications
, vol.41
, Issue.2
, pp. 129-132
-
-
Liang, K.X.1
Li, T.2
-
18
-
-
0031497880
-
Immunology for physicists
-
Perelson, A. S., Weisbuch, G., Immunology for physicists, Review of Modern Physics, 1997, 69(4): 1219-1263.
-
(1997)
Review of Modern Physics
, vol.69
, Issue.4
, pp. 1219-1263
-
-
Perelson, A.S.1
Weisbuch, G.2
-
19
-
-
1442290852
-
Negative selection: How to generate detectors
-
Canterbury UK
-
Kim, J., Bentley, P. J., Negative selection: How to generate detectors, in The First International Conference on Artificial Immune Systems (ICARIS), Canterbury UK, 2002, 89-98.
-
(2002)
The First International Conference on Artificial Immune Systems (ICARIS)
, pp. 89-98
-
-
Kim, J.1
Bentley, P.J.2
-
20
-
-
0018005935
-
Can programming be liberated from the Von Neumann style? A functional style and its algebra of programs
-
Backus, J., Can programming be liberated from the Von Neumann style? A functional style and its algebra of programs, Communications of the ACM, 1978, 21 (8): 613-641.
-
(1978)
Communications of the ACM
, vol.21
, Issue.8
, pp. 613-641
-
-
Backus, J.1
|