-
1
-
-
35248825128
-
Danger theory: The link between ais and ids
-
U Aickelin, P Bentley, S Cayzer, J Kim, and J McLeod. Danger theory: The link between ais and ids. In Proc. of the Second Internation Conference on Artificial Immune Systems (ICARIS-03), pages 147-155, 2003.
-
(2003)
Proc. of the Second Internation Conference on Artificial Immune Systems (ICARIS-03)
, pp. 147-155
-
-
Aickelin, U.1
Bentley, P.2
Cayzer, S.3
Kim, J.4
McLeod, J.5
-
2
-
-
3543128182
-
Coverage and generaliszation in an artificial immune system
-
J Balthrop, F Esponda, S Forrest, and M Glickman. Coverage and generaliszation in an artificial immune system. Proceedings of GECCO, pages 3-10, 2002.
-
(2002)
Proceedings of GECCO
, pp. 3-10
-
-
Balthrop, J.1
Esponda, F.2
Forrest, S.3
Glickman, M.4
-
4
-
-
84904336851
-
A scaled, immunological approach to anomaly countermeasures (combining ph with cfengine)
-
K Begnum and M Burgess. A scaled, immunological approach to anomaly countermeasures (combining ph with cfengine). Integrated Network Management, pages 31-42, 2003.
-
(2003)
Integrated Network Management
, pp. 31-42
-
-
Begnum, K.1
Burgess, M.2
-
5
-
-
35048902767
-
An artificial immune system approach to misbehavior detection in mobile ad-hoc networks
-
Ecole Polytechnique Federale de Lausanne
-
J Boudec and S Sarafijanovic. An artificial immune system approach to misbehavior detection in mobile ad-hoc networks. Technical Report IC/2003/59, Ecole Polytechnique Federale de Lausanne, 2003.
-
(2003)
Technical Report IC/2003/59
-
-
Boudec, J.1
Sarafijanovic, S.2
-
9
-
-
0036613083
-
An immunity-based technique to characterize intrusions in computer networks
-
D Dasgupta and F Gonzalez. An immunity-based technique to characterize intrusions in computer networks. IEEE Transactions on Evolutionary Computation, 6(3):281-291, 2002.
-
(2002)
IEEE Transactions on Evolutionary Computation
, vol.6
, Issue.3
, pp. 281-291
-
-
Dasgupta, D.1
Gonzalez, F.2
-
12
-
-
0027961889
-
Self-nonself discrimination in a computer
-
IEEE Computer Society
-
Stephanie Forrest, Alan S. Perelson, Lawrence Allen, and Rajesh Cherukuri. Self-nonself discrimination in a computer. In Proceedings of the 1994 IEEE Symposium on Security and Privacy, page 202. IEEE Computer Society, 1994.
-
(1994)
Proceedings of the 1994 IEEE Symposium on Security and Privacy
, pp. 202
-
-
Forrest, S.1
Perelson, A.S.2
Allen, L.3
Cherukuri, R.4
-
13
-
-
35048863535
-
-
Richard A. Goldsby, Thomas J. Kindt, Barbara A. Osborne, and W H Freeman, editors. W. H. Freeman and Co., 5th ed edition
-
Richard A. Goldsby, Thomas J. Kindt, Barbara A. Osborne, and W H Freeman, editors. Kubi Immunology. W. H. Freeman and Co., 5th ed edition, 2002.
-
(2002)
Kubi Immunology
-
-
-
15
-
-
0030378506
-
Information exploration shootout or benchmarks for information exploration
-
IEEE Computer Society Press
-
Georges Grinstein. Information exploration shootout or benchmarks for information exploration. In Proceedings of the 7th conference on Visualization '96, pages 449-450. IEEE Computer Society Press, 1996.
-
(1996)
Proceedings of the 7th Conference on Visualization '96
, pp. 449-450
-
-
Grinstein, G.1
-
16
-
-
0032313923
-
Intrusion detection using sequences of system calls
-
S Hofmeyr and S Forrest. Intrusion detection using sequences of system calls. Journal of Computer Security, 6:151-180, 1998.
-
(1998)
Journal of Computer Security
, vol.6
, pp. 151-180
-
-
Hofmeyr, S.1
Forrest, S.2
-
19
-
-
0015956495
-
Towards a network theory of the immune system
-
N K Jerne. Towards a network theory of the immune system. Annals of Immunology, 125:373-389, 1974.
-
(1974)
Annals of Immunology
, vol.125
, pp. 373-389
-
-
Jerne, N.K.1
-
21
-
-
0038458266
-
Evaluating negative selection in an artificial immune system for network intrusion detection
-
July
-
J Kim and P Bentley. Evaluating negative selection in an artificial immune system for network intrusion detection. Proceedings of GECCO, pages 1330-1337, July 2001.
-
(2001)
Proceedings of GECCO
, pp. 1330-1337
-
-
Kim, J.1
Bentley, P.2
-
22
-
-
0034870039
-
Towards an artificial immune system for network intrusion detection: An investigation of dynamic clonal selection
-
J Kim and P J Bentley. Towards an artificial immune system for network intrusion detection: An investigation of dynamic clonal selection. In the Congress on Evolutionary Computation (CEC-2001), Seoul, Korea, pages 1244-1252, 2001.
-
(2001)
The Congress on Evolutionary Computation (CEC-2001), Seoul, Korea
, pp. 1244-1252
-
-
Kim, J.1
Bentley, P.J.2
-
24
-
-
35048901130
-
An artificial immune system for network intrusion detection
-
Una-May O'Reilly, editor, Orlando, Florida, USA, 13
-
Jungwon Kim. An artificial immune system for network intrusion detection. In Una-May O'Reilly, editor, Graduate Student Workshop, pages 369-370, Orlando, Florida, USA, 13 1999.
-
(1999)
Graduate Student Workshop
, pp. 369-370
-
-
Kim, J.1
-
25
-
-
35048843856
-
-
MIT Lincoln Labs
-
Lincoln Labs. 1999 dataset. MIT Lincoln Labs, 1999.
-
(1999)
1999 Dataset
-
-
-
27
-
-
0003451777
-
A real-time intrusion detection expert system (ides) - Final technical report
-
Computer Science Laboratory, SRI International, California
-
T. Lunt, A. Tamaru, F. Gilham, R. Jagannathan, P. Neumann, H. Javitz, A. Valdes, and T. Garvey. A real-time intrusion detection expert system (ides) - final technical report. Technical report, Computer Science Laboratory, SRI International, California, 1992.
-
(1992)
Technical Report
-
-
Lunt, T.1
Tamaru, A.2
Gilham, F.3
Jagannathan, R.4
Neumann, P.5
Javitz, H.6
Valdes, A.7
Garvey, T.8
-
28
-
-
0032191916
-
An innate sense of danger
-
P Matzinger. An innate sense of danger. Seminars in Immunology, 10:399-415, 1998.
-
(1998)
Seminars in Immunology
, vol.10
, pp. 399-415
-
-
Matzinger, P.1
-
31
-
-
35048817579
-
-
Nessus Project
-
Nessus Project, http://www.nessus.org.
-
-
-
-
33
-
-
35048867023
-
An artificial immune system approach with secondary response for misbehavior detection in mobile ad-hoc networks
-
Ecole Polytechnique Federale de Lausanne
-
S Sarafijanovic and J Boudec. An artificial immune system approach with secondary response for misbehavior detection in mobile ad-hoc networks. Technical Report IC/2003/65, Ecole Polytechnique Federale de Lausanne, 2003.
-
(2003)
Technical Report IC/2003/65
-
-
Sarafijanovic, S.1
Boudec, J.2
-
34
-
-
0029716418
-
A sense of self for unix processes
-
A Somayaji, S Forrest, S Hofmeyr, and T Longstaff. A sense of self for unix processes. IEEE Symposium on Security and Privacy, pages 120-128, 1996.
-
(1996)
IEEE Symposium on Security and Privacy
, pp. 120-128
-
-
Somayaji, A.1
Forrest, S.2
Hofmeyr, S.3
Longstaff, T.4
-
36
-
-
84947551624
-
Cdis: Towards a computer immune system for detecting network intrusions
-
P Williams, K Anchor, J Bebo, G Gunsch, and G Lamont. Cdis: Towards a computer immune system for detecting network intrusions. In In RAID 2001, volume 2212, pages 117-133, 2001.
-
(2001)
RAID 2001
, vol.2212
, pp. 117-133
-
-
Williams, P.1
Anchor, K.2
Bebo, J.3
Gunsch, G.4
Lamont, G.5
|