-
2
-
-
33746338083
-
-
Pittsburgh, PA: Software Engineering Institute, Carnegie Mellon University
-
sm Method Implementation Guide, v2.0, Pittsburgh, PA: Software Engineering Institute, Carnegie Mellon University, 2001.
-
(2001)
sm Method Implementation Guide, V2.0
-
-
Alberts, C.J.1
Dorofee, A.J.2
-
4
-
-
0031123773
-
A quantitative model of the security intrusion process based on attacker behavior
-
Jonsson, E., Olovsson, T., A quantitative model of the security intrusion process based on attacker behavior, IEEE Trans. on Software Engineering, 1997, 23(4): 235-245.
-
(1997)
IEEE Trans. on Software Engineering
, vol.23
, Issue.4
, pp. 235-245
-
-
Jonsson, E.1
Olovsson, T.2
-
5
-
-
0033325475
-
Experimenting with quantitative evaluation tools for monitoring operational security
-
Ortalo, R., Deswarte, Y., Kaâniche, M., Experimenting with quantitative evaluation tools for monitoring operational security, IEEE Trans. on Software Engineering, 1999, 25(5): 633-650.
-
(1999)
IEEE Trans. on Software Engineering
, vol.25
, Issue.5
, pp. 633-650
-
-
Ortalo, R.1
Deswarte, Y.2
Kaâniche, M.3
-
6
-
-
0036926468
-
Modeling and quantification of security attributes of software systems
-
IPDS stream, Washington
-
Madan, B. B., Goševa-Popstojanova, K., Vaidyanathan, K. et al., Modeling and quantification of security attributes of software systems, in Int. Conf. on Dependable Systems and Networks, (IPDS stream), Washington, 2002, 2: 505-514.
-
(2002)
Int. Conf. on Dependable Systems and Networks
, vol.2
, pp. 505-514
-
-
Madan, B.B.1
Goševa-Popstojanova, K.2
Vaidyanathan, K.3
-
7
-
-
22844441814
-
An integrated framework for the assessment of network operations, reliability, and security
-
Chu, C. K., Chu, M., An integrated framework for the assessment of network operations, reliability, and security, Bell Labs Technical Journal, 2004, 8(4): 133-152.
-
(2004)
Bell Labs Technical Journal
, vol.8
, Issue.4
, pp. 133-152
-
-
Chu, C.K.1
Chu, M.2
-
8
-
-
71649110512
-
Artificial immune systems as a novel soft computing paradigm
-
de Castro, L. N., Timmis, J. I., Artificial immune systems as a novel soft computing paradigm. Soft Computing Journal, 2003, 7(8): 526-544.
-
(2003)
Soft Computing Journal
, vol.7
, Issue.8
, pp. 526-544
-
-
De Castro, L.N.1
Timmis, J.I.2
-
9
-
-
85028857450
-
An overview of evolutionary computation
-
London: Springer-Verlag
-
Spears, W. M., De Jong, K. A., An overview of evolutionary computation, in Proc. of the European Conf. on Machine Learning, London: Springer-Verlag, 1993, 667: 442-459.
-
(1993)
Proc. of the European Conf. on Machine Learning
, vol.667
, pp. 442-459
-
-
Spears, W.M.1
De Jong, K.A.2
-
11
-
-
3142752196
-
Development and prospect of the artificial immune system
-
Jiao, L., Du, H., Development and prospect of the artificial immune system, Acta Electronica Sinica, 2003, 31(10): 1540-1548.
-
(2003)
Acta Electronica Sinica
, vol.31
, Issue.10
, pp. 1540-1548
-
-
Jiao, L.1
Du, H.2
-
12
-
-
0037910212
-
Artifical immune system: Principle, models, analysis and perspectives
-
Xiao, R., Wang, L., Artifical immune system: principle, models, analysis and perspectives, Chinese Journal of Computers, 2002, 25(12): 1281-1293.
-
(2002)
Chinese Journal of Computers
, vol.25
, Issue.12
, pp. 1281-1293
-
-
Xiao, R.1
Wang, L.2
-
13
-
-
24144447453
-
-
Beijing: Publishing House of Electronics Industry
-
Li, T., Computer Immunology, Beijing: Publishing House of Electronics Industry, 2004.
-
(2004)
Computer Immunology
-
-
Li, T.1
-
15
-
-
0027434805
-
Somatic hypermutation in B cells: An optimal control treatment
-
Kepler, T. B., Perelson, A. S., Somatic hypermutation in B cells: an optimal control treatment, J. Theoret. Biol., 1993, 164: 37-64.
-
(1993)
J. Theoret. Biol.
, vol.164
, pp. 37-64
-
-
Kepler, T.B.1
Perelson, A.S.2
-
16
-
-
0027961889
-
Self-nonself discrimination in a computer
-
Oakland, CA: IEEE Computer Society
-
Forrest, S., Perelson, A. S., Self-nonself discrimination in a computer, in IEEE Symposium on Security and Privacy, Oakland, CA: IEEE Computer Society, 1994, 202-213.
-
(1994)
IEEE Symposium on Security and Privacy
, pp. 202-213
-
-
Forrest, S.1
Perelson, A.S.2
-
17
-
-
0031258214
-
Computer immunology
-
Forrest, S., Hofmeyr, S., Somayaji, A., Computer immunology, Communications of the ACM, 1997, 40(10): 88-96.
-
(1997)
Communications of the ACM
, vol.40
, Issue.10
, pp. 88-96
-
-
Forrest, S.1
Hofmeyr, S.2
Somayaji, A.3
-
18
-
-
0002320533
-
Immunity by design: An artificial immune system
-
San Francisco, CA: IEEE Press
-
Hofmeyr, S., Fonest, S., Immunity by design: an artificial immune system, in Genetic Evolutionary Computation Conf., San Francisco, CA: IEEE Press, 1999, 1289-1296.
-
(1999)
Genetic Evolutionary Computation Conf.
, pp. 1289-1296
-
-
Hofmeyr, S.1
Fonest, S.2
-
19
-
-
0034546374
-
Architecture for an artificial immune system
-
Hofmeyr, S., Forrest, S., Architecture for an artificial immune system, Evolutionary Computation, 2000, 8(4): 443-473.
-
(2000)
Evolutionary Computation
, vol.8
, Issue.4
, pp. 443-473
-
-
Hofmeyr, S.1
Forrest, S.2
-
20
-
-
2642548686
-
Immunity-based intrusion detection system: A general framework
-
Crystal City, VA: CISSE
-
Dasgupta, D., Immunity-based intrusion detection system: A general framework, in The 22nd National Information Systems Security Conf., Crystal City, VA: CISSE, 1999, 147-160.
-
(1999)
The 22nd National Information Systems Security Conf.
, pp. 147-160
-
-
Dasgupta, D.1
-
21
-
-
0036613003
-
An artificial immune system architecture for computer security applications
-
Harmer, P. K., Williams, P. D., Gunsch, G. H. et al., An artificial immune system architecture for computer security applications, IEEE Transaction on Evolutionary Computation, 2002, 6(3): 252-280.
-
(2002)
IEEE Transaction on Evolutionary Computation
, vol.6
, Issue.3
, pp. 252-280
-
-
Harmer, P.K.1
Williams, P.D.2
Gunsch, G.H.3
-
22
-
-
84901408225
-
Towards an artificial immune system for network intrusion detection: An investigation of dynamic clonal selection
-
Honolulu
-
Kim, J., Bentley, P. J., Towards an artificial immune system for network intrusion detection: an investigation of dynamic clonal selection, in Congress on Evolutionary Computation (CEC-2002), Honolulu, 2002, 1015-1020.
-
(2002)
Congress on Evolutionary Computation (CEC-2002)
, pp. 1015-1020
-
-
Kim, J.1
Bentley, P.J.2
-
23
-
-
0018005935
-
Can programming be liberated from the von Neumann style? A functional style and its algebra of programs
-
Backus, J., Can programming be liberated from the Von Neumann style? A functional style and its algebra of programs, CACM, 1978, 21(8): 613-641.
-
(1978)
CACM
, vol.21
, Issue.8
, pp. 613-641
-
-
Backus, J.1
-
24
-
-
0031497880
-
Immunology for physicists
-
Perelson, A. S., Weisbuch, G, Immunology for physicists, Review of Modern Physics, 1997, 69(4): 1219-1263.
-
(1997)
Review of Modern Physics
, vol.69
, Issue.4
, pp. 1219-1263
-
-
Perelson, A.S.1
Weisbuch, G.2
|