-
2
-
-
33750255815
-
-
as of 16 Aug
-
Cert Coordination Center Website www.cert.org as of 16 Aug 2005.
-
(2005)
-
-
-
3
-
-
0036613083
-
An immunity-based technique to characterize intrusions in computer networks
-
June
-
D. Dasgupta, An Immunity-Based Technique to Characterize Intrusions in Computer Networks, IEEE Transactions on Evolutionary Computation, Vol 6, No. 3, June 2002.
-
(2002)
IEEE Transactions on Evolutionary Computation
, vol.6
, Issue.3
-
-
Dasgupta, D.1
-
8
-
-
21244465997
-
How do we evaluate artificial immune systems?
-
S. M. Garrett, How Do We Evaluate Artificial Immune Systems?, Evolutionary Computation, 13(2), pp 145-178, 2005
-
(2005)
Evolutionary Computation
, vol.13
, Issue.2
, pp. 145-178
-
-
Garrett, S.M.1
-
9
-
-
33644578864
-
Real world anti-virus product reviews and evaluations - The current state of affairs
-
Baltimore, MD, USA, Oct. National Institute of Standards and Technology (NIST)
-
S. Gordon and R. Ford. Real world anti-virus product reviews and evaluations - the current state of affairs. In Proceedings of the 19th National Information Systems Security Conference (NISSC'96), pages 526-538, Baltimore, MD, USA, Oct. 1996. National Institute of Standards and Technology (NIST).
-
(1996)
Proceedings of the 19th National Information Systems Security Conference (NISSC'96)
, pp. 526-538
-
-
Gordon, S.1
Ford, R.2
-
11
-
-
0036613003
-
An artificial immune system architecture for computer security applications
-
P. K. Harmer, P. D. Williams, C: H. Gunsch, G. B. Lamont, An Artificial Immune System Architecture for Computer Security Applications, IEEE Transactions on Evolutionary Computation, 6(3):252-280, 2002
-
(2002)
IEEE Transactions on Evolutionary Computation
, vol.6
, Issue.3
, pp. 252-280
-
-
Harmer, P.K.1
Williams, P.D.2
Gunsch, C.H.3
Lamont, G.B.4
-
12
-
-
0034546374
-
Architecture for an artificial immune system
-
S. Hofmeyer and S. Forrest, Architecture for an Artificial Immune System,. Evolutionary Computation, Vol 8, No. 4, pp 443-473, 2000.
-
(2000)
Evolutionary Computation
, vol.8
, Issue.4
, pp. 443-473
-
-
Hofmeyer, S.1
Forrest, S.2
-
14
-
-
0038628891
-
Applications of competitor RNA in diagnostic reverse transcription-PCR
-
May
-
S. B. Kleiboeker, Applications of Competitor RNA in Diagnostic Reverse Transcription-PCR, Journal of Clinical Microbiology, May 2003, p. 2055-2061, Vol. 41, No. 5
-
(2003)
Journal of Clinical Microbiology
, vol.41
, Issue.5
, pp. 2055-2061
-
-
Kleiboeker, S.B.1
-
15
-
-
85164392958
-
A study of cross-validation and bootstrap for accuracy estimation and model selection
-
R. Kohavi, A study of cross-validation and bootstrap for accuracy estimation and model selection, IJCAI, 1995.
-
(1995)
IJCAI
-
-
Kohavi, R.1
-
16
-
-
0009950263
-
A distributed architecture for a self-adaptive computer virus immune system
-
eds. Corne, Dorigo, and Glover, McGraw Hill
-
G. B. Lamont, R. Marmelstein, D. Van Veldhuizen, A Distributed Architecture for a Self-Adaptive Computer Virus Immune System, in New Ideas in Optimization, eds. Corne, Dorigo, and Glover, McGraw Hill, 1999
-
(1999)
New Ideas in Optimization
-
-
Lamont, G.B.1
Marmelstein, R.2
Van Veldhuizen, D.3
-
17
-
-
33750249077
-
-
University of Sydney, Australia, as of 30 Aug
-
Lecture notes from School of Molecular and Microbial Sciences. University of Sydney, Australia, www.biochem.usyd.edu.au/MBLG2001/BMedSci/ lecture%2013_Transcription.ppt as of 30 Aug 2005.
-
(2005)
Lecture Notes from School of Molecular and Microbial Sciences
-
-
-
18
-
-
85027110009
-
A distributed approach to computer virus detection and neutralization by autonomous and heterogeneous agents
-
T. Okamoto and Y. Ishida, A Distributed Approach to Computer Virus Detection and Neutralization by Autonomous and Heterogeneous Agents, Proceedings of the ISADS 1999 pp. 328-331.
-
Proceedings of the ISADS 1999
, pp. 328-331
-
-
Okamoto, T.1
Ishida, Y.2
-
19
-
-
0027532161
-
Predicting the size of the T-cell receptor and antibody combining region from consideration of efficient self-nonself discrimination
-
Mar. 1
-
J. Percus, O. Percus, A. Perelson, Predicting the Size of the T-Cell Receptor and Antibody Combining Region from Consideration of Efficient Self-Nonself Discrimination, Proceedings of the National Academy of Sciences of the United States of America, Vol. 90, No. 5 (Mar. 1, 1993), pp. 1691-1695
-
(1993)
Proceedings of the National Academy of Sciences of the United States of America
, vol.90
, Issue.5
, pp. 1691-1695
-
-
Percus, J.1
Percus, O.2
Perelson, A.3
-
23
-
-
28444463167
-
An overview of artificial immune systems
-
R Paton, H Bolouri, M Holcombe, J H Parish, and R Tateson, editors, Springer, November
-
A. J Timmis, T Knight, L N De Castro, and E Hart, An overview of artificial immune systems in R Paton, H Bolouri, M Holcombe, J H Parish, and R Tateson, editors, "Computation in Cells and Tissues: Perspectives and Tools for Thought", Natural Computation Series, pages 51-86. Springer, November 2004.
-
(2004)
"Computation in Cells and Tissues: Perspectives and Tools for Thought", Natural Computation Series
, pp. 51-86
-
-
Timmis, A.J.1
Knight, T.2
De Castro, L.N.3
Hart, E.4
-
24
-
-
33750239050
-
Warthog: Towards a computer immune system for detecting "low and slow" information system attacks
-
P. D. Williams, K. Anchor, J. Bebo, G. Gunsch, G. Lamont, Warthog: Towards a Computer Immune System for Detecting "Low and Slow" Information System Attacks, Recent Advances in Intrusion Detection, RAID, 2001
-
(2001)
Recent Advances in Intrusion Detection, RAID
-
-
Williams, P.D.1
Anchor, K.2
Bebo, J.3
Gunsch, G.4
Lamont, G.5
-
25
-
-
3042859422
-
-
X. Yao and Y. Liu, Fast Evolution Strategies, Control & Cybernetics., vol. 26, no. 3, pp. 467-496, 1997
-
(1997)
Fast Evolution Strategies, Control & Cybernetics
, vol.26
, Issue.3
, pp. 467-496
-
-
Yao, X.1
Liu, Y.2
|