메뉴 건너뛰기




Volumn 2, Issue , 2002, Pages 1045-1050

Revisiting LISYS: Parameters and normal behavior

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER SCIENCE; EVOLUTIONARY ALGORITHMS;

EID: 33750972259     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CEC.2002.1004387     Document Type: Conference Paper
Times cited : (67)

References (19)
  • 4
    • 84903600736 scopus 로고    scopus 로고
    • Detector coverage with the r-contiguous bits matching rule
    • UNM
    • F. Esponda. Detector coverage with the r-contiguous bits matching rule. Tech. Report TR-CS-2002-03, UNM, 2002.
    • (2002) Tech. Report TR-CS-2002-03
    • Esponda, F.1
  • 8
    • 0034546374 scopus 로고    scopus 로고
    • Architecture for an artificial immune system
    • S. Hofmeyr and S. Forrest. Architecture for an artificial immune system. Evolutionary Comp. Jrnl. 8(4)443-473, 2000.
    • (2000) Evolutionary Comp. Jrnl. , vol.8 , Issue.4 , pp. 443-473
    • Hofmeyr, S.1    Forrest, S.2
  • 9
    • 84903559104 scopus 로고    scopus 로고
    • Personal Communication
    • K. Ingham, 2001. Personal communication.
    • (2001)
    • Ingham, K.1
  • 11
    • 0012330853 scopus 로고    scopus 로고
    • Negative selection and niching by an artificial immune system for network intrusion detection
    • J. Kim and P. Bentley. Negative selection and niching by an artificial immune system for network intrusion detection. In GECCO-99 Proceedings, p. 149-158, 1999.
    • (1999) GECCO-99 Proceedings , pp. 149-158
    • Kim, J.1    Bentley, P.2
  • 12
    • 0038458266 scopus 로고    scopus 로고
    • An evaluation of negative selection in an artificial immune system for network intrusion detection
    • J. Kim and P. Bentley. An evaluation of negative selection in an artificial immune system for network intrusion detection. In GECCO-2001 Proceedings, p. 1330-1337, 2001.
    • (2001) GECC0-2001 Proceedings , pp. 1330-1337
    • Kim, J.1    Bentley, P.2
  • 13
    • 85019691440 scopus 로고    scopus 로고
    • Testing intrusion detection systems: A critique of the 1998 and 1999 darpa intrusion detection system evaluations as performed by lincoln laboratory
    • ACM, November 2000
    • J. McHugh. Testing intrusion detection systems: A critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory. In ACM Transactions, November 2000, 3(4):262-294, ACM, 2000.
    • (2000) ACM Transactions , vol.3 , Issue.4 , pp. 262-294
    • McHugh, J.1
  • 15
    • 0027532161 scopus 로고
    • Predicting the size of the antibody combining region from consideration of efficient self/non-self discrimination
    • J. Percus, O. Percus, and A. Perelson. Predicting the size of the antibody combining region from consideration of efficient self/non-self discrimination. Proc. of the National Academy of Science, 90:1691-1695, 1993.
    • (1993) Proc. of the National Academy of Science , vol.90 , pp. 1691-1695
    • Percus, J.1    Percus, O.2    Perelson, A.3
  • 16
    • 0742300833 scopus 로고    scopus 로고
    • Discriminative power of the receptors activated by k-contiguous bits rule
    • S. T. Wierzchon. Discriminative power of the receptors activated by k-contiguous bits rule. Journal of Computer Science and Technology, 1(3):1-13, 2000.
    • (2000) Journal of Computer Science and Technology , vol.1 , Issue.3 , pp. 1-13
    • Wierzchon, S.T.1
  • 17
    • 0742266245 scopus 로고    scopus 로고
    • Generating optimal repertoire of antibody strings in an artificial immune system
    • S. T. Wierzchon. Generating optimal repertoire of antibody strings in an artificial immune system, In Intelligent Information Systems, 119 133, 2000.
    • (2000) Intelligent Information Systems , vol.119 , pp. 133
    • Wierzchon, S.T.1
  • 18
    • 0742282973 scopus 로고    scopus 로고
    • Deriving concise description of non-self patterns in an artificial immune system
    • S. T. Wierzchon. Deriving concise description of non-self patterns in an artificial immune system. In New Learnrng Paradigm in Soft Computing, 438-458, 2001.
    • (2001) New Learnrng Paradigm in Soft Computing , pp. 438-458
    • Wierzchon, S.T.1
  • 19
    • 84947551624 scopus 로고    scopus 로고
    • CDIS: Towards a computer immune system for detecting network intrusions
    • P. Williams, K. Anchor, J. Bebo, G. Gunsch, and G. Lamont. CDIS: Towards a computer immune system for detecting network intrusions. In RAID 2001, 2212:117-133, 2001.
    • (2001) RAID 2001 , vol.2212 , pp. 117-133
    • Williams, P.1    Anchor, K.2    Bebo, J.3    Gunsch, G.4    Lamont, G.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.