-
4
-
-
84903600736
-
Detector coverage with the r-contiguous bits matching rule
-
UNM
-
F. Esponda. Detector coverage with the r-contiguous bits matching rule. Tech. Report TR-CS-2002-03, UNM, 2002.
-
(2002)
Tech. Report TR-CS-2002-03
-
-
Esponda, F.1
-
6
-
-
0024984013
-
A network security monitor
-
IEE Press
-
L. Heberlein, G. Dias, K. Levitte, B. Mukherjee, J. Wood, and D. Wolber. A network security monitor. In Proc. of the IEEE Symp. on Security and Privacy. IEE Press, 1990.
-
(1990)
Proc. of the IEEE Symp. on Security and Privacy
-
-
Heberlein, L.1
Dias, G.2
Levitte, K.3
Mukherjee, B.4
Wood, J.5
Wolber, D.6
-
8
-
-
0034546374
-
Architecture for an artificial immune system
-
S. Hofmeyr and S. Forrest. Architecture for an artificial immune system. Evolutionary Comp. Jrnl. 8(4)443-473, 2000.
-
(2000)
Evolutionary Comp. Jrnl.
, vol.8
, Issue.4
, pp. 443-473
-
-
Hofmeyr, S.1
Forrest, S.2
-
9
-
-
84903559104
-
-
Personal Communication
-
K. Ingham, 2001. Personal communication.
-
(2001)
-
-
Ingham, K.1
-
11
-
-
0012330853
-
Negative selection and niching by an artificial immune system for network intrusion detection
-
J. Kim and P. Bentley. Negative selection and niching by an artificial immune system for network intrusion detection. In GECCO-99 Proceedings, p. 149-158, 1999.
-
(1999)
GECCO-99 Proceedings
, pp. 149-158
-
-
Kim, J.1
Bentley, P.2
-
12
-
-
0038458266
-
An evaluation of negative selection in an artificial immune system for network intrusion detection
-
J. Kim and P. Bentley. An evaluation of negative selection in an artificial immune system for network intrusion detection. In GECCO-2001 Proceedings, p. 1330-1337, 2001.
-
(2001)
GECC0-2001 Proceedings
, pp. 1330-1337
-
-
Kim, J.1
Bentley, P.2
-
13
-
-
85019691440
-
Testing intrusion detection systems: A critique of the 1998 and 1999 darpa intrusion detection system evaluations as performed by lincoln laboratory
-
ACM, November 2000
-
J. McHugh. Testing intrusion detection systems: A critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory. In ACM Transactions, November 2000, 3(4):262-294, ACM, 2000.
-
(2000)
ACM Transactions
, vol.3
, Issue.4
, pp. 262-294
-
-
McHugh, J.1
-
15
-
-
0027532161
-
Predicting the size of the antibody combining region from consideration of efficient self/non-self discrimination
-
J. Percus, O. Percus, and A. Perelson. Predicting the size of the antibody combining region from consideration of efficient self/non-self discrimination. Proc. of the National Academy of Science, 90:1691-1695, 1993.
-
(1993)
Proc. of the National Academy of Science
, vol.90
, pp. 1691-1695
-
-
Percus, J.1
Percus, O.2
Perelson, A.3
-
16
-
-
0742300833
-
Discriminative power of the receptors activated by k-contiguous bits rule
-
S. T. Wierzchon. Discriminative power of the receptors activated by k-contiguous bits rule. Journal of Computer Science and Technology, 1(3):1-13, 2000.
-
(2000)
Journal of Computer Science and Technology
, vol.1
, Issue.3
, pp. 1-13
-
-
Wierzchon, S.T.1
-
17
-
-
0742266245
-
Generating optimal repertoire of antibody strings in an artificial immune system
-
S. T. Wierzchon. Generating optimal repertoire of antibody strings in an artificial immune system, In Intelligent Information Systems, 119 133, 2000.
-
(2000)
Intelligent Information Systems
, vol.119
, pp. 133
-
-
Wierzchon, S.T.1
-
18
-
-
0742282973
-
Deriving concise description of non-self patterns in an artificial immune system
-
S. T. Wierzchon. Deriving concise description of non-self patterns in an artificial immune system. In New Learnrng Paradigm in Soft Computing, 438-458, 2001.
-
(2001)
New Learnrng Paradigm in Soft Computing
, pp. 438-458
-
-
Wierzchon, S.T.1
-
19
-
-
84947551624
-
CDIS: Towards a computer immune system for detecting network intrusions
-
P. Williams, K. Anchor, J. Bebo, G. Gunsch, and G. Lamont. CDIS: Towards a computer immune system for detecting network intrusions. In RAID 2001, 2212:117-133, 2001.
-
(2001)
RAID 2001
, vol.2212
, pp. 117-133
-
-
Williams, P.1
Anchor, K.2
Bebo, J.3
Gunsch, G.4
Lamont, G.5
|