-
3
-
-
2642537707
-
An artificial immune based intrusion detection model for computer and telecommunication systems
-
Azzedine Boukerche, Kathia Regina L. Jucá, Jo ao Bosco M. Sobral, and Mirela Sechi Moretti Annoni Notare. An artificial immune based intrusion detection model for computer and telecommunication systems. Parallel Computing, 30:629-646, 2004.
-
(2004)
Parallel Computing
, vol.30
, pp. 629-646
-
-
Boukerche, A.1
Jucá, K.R.L.2
Sobral, J.A.B.M.3
Notare, M.S.M.A.4
-
4
-
-
0004125425
-
-
chapter An Anomaly DetectionAlgorithm Inspired by the Immune System. Springer-Verlag Berlin and Heidelberg GmbH
-
Dipankar Dasgupta and Stephanie Forrest. Artificial Immune Systems and Their Applications, chapter An Anomaly DetectionAlgorithm Inspired by the Immune System. Springer-Verlag Berlin and Heidelberg GmbH, 1999.
-
(1999)
Artificial Immune Systems and Their Applications
-
-
Dasgupta, D.1
Forrest, S.2
-
7
-
-
0002320533
-
Immunity by design: An artificial immune system
-
Wolfgang Banzhaf, Jason Daida, Agoston E. Eiben, Max H. Garzon, Vasant Honavar, Mark Jakiela, and Robert E. Smith, editors, Orlando, Florida, USA, 13-17. Morgan Kaufmann
-
Steven A. Hofmeyr and Stephanie Forrest. Immunity by design: An artificial immune system. In Wolfgang Banzhaf, Jason Daida, Agoston E. Eiben, Max H. Garzon, Vasant Honavar, Mark Jakiela, and Robert E. Smith, editors, Proceedings of the Genetic and Evolutionary Computation Conference, volume 2, pages 1289-1296, Orlando, Florida, USA, 13-17 1999. Morgan Kaufmann.
-
(1999)
Proceedings of the Genetic and Evolutionary Computation Conference
, vol.2
, pp. 1289-1296
-
-
Hofmeyr, S.A.1
Forrest, S.2
-
9
-
-
84858924892
-
Human immune anomaly and misuse based detection for computer system operations: Part ii
-
Kathia Regina L. Jucá, Azzedine Boukerche, Jo ao Bosco M. Sobral, and Mirela Sechi Moretti Annoni Notare. Human immune anomaly and misuse based detection for computer system operations: part ii. IEEE IPDPS/NDISC, 2003.
-
(2003)
IEEE IPDPS/NDISC
-
-
Jucá, K.R.L.1
Boukerche, A.2
Sobral, J.A.B.M.3
Notare, M.S.M.A.4
-
11
-
-
0038458266
-
Evaluating negative selection in an artificial immune system for network intrusion dettection
-
Jungwon Kim and Peter Bentley. Evaluating negative selection in an artificial immune system for network intrusion dettection. In Proc of the Genetic and Evolutionary Computation Conference, pages 1330-1337, 2001.
-
(2001)
Proc of the Genetic and Evolutionary Computation Conference
, pp. 1330-1337
-
-
Kim, J.1
Bentley, P.2
-
12
-
-
84858924188
-
-
Aug
-
Kruskal wallis metod. http://www.itl.nist. gov/div898/software/dataplot/refmanl/ auxillar/krusk%wal.htm, Aug 2004.
-
(2004)
Kruskal Wallis Metod
-
-
-
13
-
-
0003518833
-
-
PhD thesis, Purdue University, W, Purdue, IN
-
Sandeep Kumar. Classification and Detection of Computer Intrusions. PhD thesis, Purdue University, W, Purdue, IN, 1995.
-
(1995)
Classification and Detection of Computer Intrusions
-
-
Kumar, S.1
-
15
-
-
84957039800
-
Principles of a computer immune system
-
ACM
-
Anil Somayaji, Steven Hofmeyr, and Stephanie Forrest. Principles of a computer immune system. In Meeting on New Security Paradigms, 23-26 Sept. 1997, Langdale, UK. ACM, 1998.
-
(1998)
Meeting on New Security Paradigms, 23-26 Sept. 1997, Langdale, UK
-
-
Somayaji, A.1
Hofmeyr, S.2
Forrest, S.3
|