메뉴 건너뛰기




Volumn 1, Issue , 2006, Pages 103-110

A retrovirus inspired algorithm for virus detection & optimization

Author keywords

Computer Virus; Detection; Function Optimization; Genetic Algorithms; Memetic; RNA; Security

Indexed keywords

COMPUTATIONAL COMPLEXITY; GENETIC ALGORITHMS; OPTIMIZATION; RNA; ROBUSTNESS (CONTROL SYSTEMS); SECURITY OF DATA;

EID: 33750273863     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1143997.1144016     Document Type: Conference Paper
Times cited : (27)

References (25)
  • 2
    • 33750255815 scopus 로고    scopus 로고
    • as of 16 Aug
    • Cert Coordination Center Website www.cert.org as of 16 Aug 2005.
    • (2005)
  • 3
    • 0036613083 scopus 로고    scopus 로고
    • An immunity-based technique to characterize intrusions in computer networks
    • June
    • D. Dasgupta, An Immunity-Based Technique to Characterize Intrusions in Computer Networks, IEEE Transactions on Evolutionary Computation, Vol 6, No. 3, June 2002.
    • (2002) IEEE Transactions on Evolutionary Computation , vol.6 , Issue.3
    • Dasgupta, D.1
  • 8
    • 21244465997 scopus 로고    scopus 로고
    • How do we evaluate artificial immune systems?
    • S. M. Garrett, How Do We Evaluate Artificial Immune Systems?, Evolutionary Computation, 13(2), pp 145-178, 2005
    • (2005) Evolutionary Computation , vol.13 , Issue.2 , pp. 145-178
    • Garrett, S.M.1
  • 9
    • 33644578864 scopus 로고    scopus 로고
    • Real world anti-virus product reviews and evaluations - The current state of affairs
    • Baltimore, MD, USA, Oct. National Institute of Standards and Technology (NIST)
    • S. Gordon and R. Ford. Real world anti-virus product reviews and evaluations - the current state of affairs. In Proceedings of the 19th National Information Systems Security Conference (NISSC'96), pages 526-538, Baltimore, MD, USA, Oct. 1996. National Institute of Standards and Technology (NIST).
    • (1996) Proceedings of the 19th National Information Systems Security Conference (NISSC'96) , pp. 526-538
    • Gordon, S.1    Ford, R.2
  • 12
    • 0034546374 scopus 로고    scopus 로고
    • Architecture for an artificial immune system
    • S. Hofmeyer and S. Forrest, Architecture for an Artificial Immune System,. Evolutionary Computation, Vol 8, No. 4, pp 443-473, 2000.
    • (2000) Evolutionary Computation , vol.8 , Issue.4 , pp. 443-473
    • Hofmeyer, S.1    Forrest, S.2
  • 14
    • 0038628891 scopus 로고    scopus 로고
    • Applications of competitor RNA in diagnostic reverse transcription-PCR
    • May
    • S. B. Kleiboeker, Applications of Competitor RNA in Diagnostic Reverse Transcription-PCR, Journal of Clinical Microbiology, May 2003, p. 2055-2061, Vol. 41, No. 5
    • (2003) Journal of Clinical Microbiology , vol.41 , Issue.5 , pp. 2055-2061
    • Kleiboeker, S.B.1
  • 15
    • 85164392958 scopus 로고
    • A study of cross-validation and bootstrap for accuracy estimation and model selection
    • R. Kohavi, A study of cross-validation and bootstrap for accuracy estimation and model selection, IJCAI, 1995.
    • (1995) IJCAI
    • Kohavi, R.1
  • 16
    • 0009950263 scopus 로고    scopus 로고
    • A distributed architecture for a self-adaptive computer virus immune system
    • eds. Corne, Dorigo, and Glover, McGraw Hill
    • G. B. Lamont, R. Marmelstein, D. Van Veldhuizen, A Distributed Architecture for a Self-Adaptive Computer Virus Immune System, in New Ideas in Optimization, eds. Corne, Dorigo, and Glover, McGraw Hill, 1999
    • (1999) New Ideas in Optimization
    • Lamont, G.B.1    Marmelstein, R.2    Van Veldhuizen, D.3
  • 17
    • 33750249077 scopus 로고    scopus 로고
    • University of Sydney, Australia, as of 30 Aug
    • Lecture notes from School of Molecular and Microbial Sciences. University of Sydney, Australia, www.biochem.usyd.edu.au/MBLG2001/BMedSci/ lecture%2013_Transcription.ppt as of 30 Aug 2005.
    • (2005) Lecture Notes from School of Molecular and Microbial Sciences
  • 18
    • 85027110009 scopus 로고    scopus 로고
    • A distributed approach to computer virus detection and neutralization by autonomous and heterogeneous agents
    • T. Okamoto and Y. Ishida, A Distributed Approach to Computer Virus Detection and Neutralization by Autonomous and Heterogeneous Agents, Proceedings of the ISADS 1999 pp. 328-331.
    • Proceedings of the ISADS 1999 , pp. 328-331
    • Okamoto, T.1    Ishida, Y.2
  • 19
    • 0027532161 scopus 로고
    • Predicting the size of the T-cell receptor and antibody combining region from consideration of efficient self-nonself discrimination
    • Mar. 1
    • J. Percus, O. Percus, A. Perelson, Predicting the Size of the T-Cell Receptor and Antibody Combining Region from Consideration of Efficient Self-Nonself Discrimination, Proceedings of the National Academy of Sciences of the United States of America, Vol. 90, No. 5 (Mar. 1, 1993), pp. 1691-1695
    • (1993) Proceedings of the National Academy of Sciences of the United States of America , vol.90 , Issue.5 , pp. 1691-1695
    • Percus, J.1    Percus, O.2    Perelson, A.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.