메뉴 건너뛰기




Volumn 48, Issue 5, 2005, Pages 557-578

An immunity based network security risk estimation

Author keywords

Artificial immune system; Intrusion detection; Network security; Risk estimation

Indexed keywords


EID: 33744816550     PISSN: 10092757     EISSN: None     Source Type: Journal    
DOI: 10.1360/04yf0140     Document Type: Article
Times cited : (118)

References (24)
  • 4
    • 0031123773 scopus 로고    scopus 로고
    • A quantitative model of the security intrusion process based on attacker behavior
    • Jonsson, E., Olovsson, T., A quantitative model of the security intrusion process based on attacker behavior, IEEE Trans. on Software Engineering, 1997, 23(4): 235-245.
    • (1997) IEEE Trans. on Software Engineering , vol.23 , Issue.4 , pp. 235-245
    • Jonsson, E.1    Olovsson, T.2
  • 5
    • 0033325475 scopus 로고    scopus 로고
    • Experimenting with quantitative evaluation tools for monitoring operational security
    • Ortalo, R., Deswarte, Y., Kaâniche, M., Experimenting with quantitative evaluation tools for monitoring operational security, IEEE Trans. on Software Engineering, 1999, 25(5): 633-650.
    • (1999) IEEE Trans. on Software Engineering , vol.25 , Issue.5 , pp. 633-650
    • Ortalo, R.1    Deswarte, Y.2    Kaâniche, M.3
  • 7
    • 22844441814 scopus 로고    scopus 로고
    • An integrated framework for the assessment of network operations, reliability, and security
    • Chu, C. K., Chu, M., An integrated framework for the assessment of network operations, reliability, and security, Bell Labs Technical Journal, 2004, 8(4): 133-152.
    • (2004) Bell Labs Technical Journal , vol.8 , Issue.4 , pp. 133-152
    • Chu, C.K.1    Chu, M.2
  • 8
    • 71649110512 scopus 로고    scopus 로고
    • Artificial immune systems as a novel soft computing paradigm
    • de Castro, L. N., Timmis, J. I., Artificial immune systems as a novel soft computing paradigm. Soft Computing Journal, 2003, 7(8): 526-544.
    • (2003) Soft Computing Journal , vol.7 , Issue.8 , pp. 526-544
    • De Castro, L.N.1    Timmis, J.I.2
  • 11
    • 3142752196 scopus 로고    scopus 로고
    • Development and prospect of the artificial immune system
    • Jiao, L., Du, H., Development and prospect of the artificial immune system, Acta Electronica Sinica, 2003, 31(10): 1540-1548.
    • (2003) Acta Electronica Sinica , vol.31 , Issue.10 , pp. 1540-1548
    • Jiao, L.1    Du, H.2
  • 12
    • 0037910212 scopus 로고    scopus 로고
    • Artifical immune system: Principle, models, analysis and perspectives
    • Xiao, R., Wang, L., Artifical immune system: principle, models, analysis and perspectives, Chinese Journal of Computers, 2002, 25(12): 1281-1293.
    • (2002) Chinese Journal of Computers , vol.25 , Issue.12 , pp. 1281-1293
    • Xiao, R.1    Wang, L.2
  • 13
    • 24144447453 scopus 로고    scopus 로고
    • Beijing: Publishing House of Electronics Industry
    • Li, T., Computer Immunology, Beijing: Publishing House of Electronics Industry, 2004.
    • (2004) Computer Immunology
    • Li, T.1
  • 15
    • 0027434805 scopus 로고
    • Somatic hypermutation in B cells: An optimal control treatment
    • Kepler, T. B., Perelson, A. S., Somatic hypermutation in B cells: an optimal control treatment, J. Theoret. Biol., 1993, 164: 37-64.
    • (1993) J. Theoret. Biol. , vol.164 , pp. 37-64
    • Kepler, T.B.1    Perelson, A.S.2
  • 16
    • 0027961889 scopus 로고
    • Self-nonself discrimination in a computer
    • Oakland, CA: IEEE Computer Society
    • Forrest, S., Perelson, A. S., Self-nonself discrimination in a computer, in IEEE Symposium on Security and Privacy, Oakland, CA: IEEE Computer Society, 1994, 202-213.
    • (1994) IEEE Symposium on Security and Privacy , pp. 202-213
    • Forrest, S.1    Perelson, A.S.2
  • 18
    • 0002320533 scopus 로고    scopus 로고
    • Immunity by design: An artificial immune system
    • San Francisco, CA: IEEE Press
    • Hofmeyr, S., Fonest, S., Immunity by design: an artificial immune system, in Genetic Evolutionary Computation Conf., San Francisco, CA: IEEE Press, 1999, 1289-1296.
    • (1999) Genetic Evolutionary Computation Conf. , pp. 1289-1296
    • Hofmeyr, S.1    Fonest, S.2
  • 19
    • 0034546374 scopus 로고    scopus 로고
    • Architecture for an artificial immune system
    • Hofmeyr, S., Forrest, S., Architecture for an artificial immune system, Evolutionary Computation, 2000, 8(4): 443-473.
    • (2000) Evolutionary Computation , vol.8 , Issue.4 , pp. 443-473
    • Hofmeyr, S.1    Forrest, S.2
  • 20
    • 2642548686 scopus 로고    scopus 로고
    • Immunity-based intrusion detection system: A general framework
    • Crystal City, VA: CISSE
    • Dasgupta, D., Immunity-based intrusion detection system: A general framework, in The 22nd National Information Systems Security Conf., Crystal City, VA: CISSE, 1999, 147-160.
    • (1999) The 22nd National Information Systems Security Conf. , pp. 147-160
    • Dasgupta, D.1
  • 22
    • 84901408225 scopus 로고    scopus 로고
    • Towards an artificial immune system for network intrusion detection: An investigation of dynamic clonal selection
    • Honolulu
    • Kim, J., Bentley, P. J., Towards an artificial immune system for network intrusion detection: an investigation of dynamic clonal selection, in Congress on Evolutionary Computation (CEC-2002), Honolulu, 2002, 1015-1020.
    • (2002) Congress on Evolutionary Computation (CEC-2002) , pp. 1015-1020
    • Kim, J.1    Bentley, P.J.2
  • 23
    • 0018005935 scopus 로고
    • Can programming be liberated from the von Neumann style? A functional style and its algebra of programs
    • Backus, J., Can programming be liberated from the Von Neumann style? A functional style and its algebra of programs, CACM, 1978, 21(8): 613-641.
    • (1978) CACM , vol.21 , Issue.8 , pp. 613-641
    • Backus, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.