-
1
-
-
33846201992
-
-
HP Laboratories Bristol, Digital Media Systems Laboratory
-
Aickelin U., Bentley P., Cayzer S., Kim J., and McLeod J. Danger Theory: The link between AIS and IDS? Research Report HPL-2003-138 (2003), HP Laboratories Bristol, Digital Media Systems Laboratory
-
(2003)
Danger Theory: The link between AIS and IDS? Research Report HPL-2003-138
-
-
Aickelin, U.1
Bentley, P.2
Cayzer, S.3
Kim, J.4
McLeod, J.5
-
2
-
-
33846236235
-
-
Uwe Aickelin, Steve Cayzer, The Danger Theory and its application to artificial immune systems, in: Proceedings of the 1st International Conference on Artificial Immune Systems (ICARIS 2002), Canterbury, UK, 2002, pp. 141-148.
-
-
-
-
3
-
-
0003794137
-
-
Prentice-Hall, Englewood Cliffs, NJ, USA
-
Bertsekas D., and Gallagar R. Data Networks (1987), Prentice-Hall, Englewood Cliffs, NJ, USA
-
(1987)
Data Networks
-
-
Bertsekas, D.1
Gallagar, R.2
-
4
-
-
33846185404
-
-
CERT advisory CA-2001-19 Code Red worm exploiting buffer overflow in IIS indexing service DLL, Web page at , January 2002.
-
-
-
-
9
-
-
85066851244
-
-
C. Kruegel, W. Robertson, Alert verification: determining the success of intrusion attempts, in: 1st Workshop on Detection of Intrusions and Malware & Vulnerability Assessment, July, 2004.
-
-
-
-
10
-
-
33846252647
-
-
G.H. Kim, E.H. Spafford, The design and implementation of Tripwire: a file system integrity checker, Technical Report CSD-TR-93-071, Purdue University, Dept. of Computer Sciences, Purdue University, West Lafayette, IN 47907-1398, 1993.
-
-
-
-
11
-
-
33846205478
-
-
Jeffrey O. Kephart, Gregory B. Sorkin, Generic disinfection of programs infected with a computer virus, US Patent 5,613,002, US Patent Office, March, 1997.
-
-
-
-
12
-
-
32644443064
-
Blueprint for a computer immune system
-
Virus Bulletin, Ltd., San Francisco, CA, USA
-
Kephart J.O., Sorkin G.B., Swimmer M., and White S.R. Blueprint for a computer immune system. Proceedings of the Seventh International Virus Bulletin Conference (1997), Virus Bulletin, Ltd., San Francisco, CA, USA
-
(1997)
Proceedings of the Seventh International Virus Bulletin Conference
-
-
Kephart, J.O.1
Sorkin, G.B.2
Swimmer, M.3
White, S.R.4
-
13
-
-
0038038229
-
Blueprint for a computer immune system
-
Dasgupta D. (Ed), Springer, Berlin, Germany
-
Kephart J.O., Sorkin G.B., Swimmer M., and White S.R. Blueprint for a computer immune system. In: Dasgupta D. (Ed). Artificial Immune Systems and their Applications (1998), Springer, Berlin, Germany 242-261
-
(1998)
Artificial Immune Systems and their Applications
, pp. 242-261
-
-
Kephart, J.O.1
Sorkin, G.B.2
Swimmer, M.3
White, S.R.4
-
15
-
-
33846232562
-
-
Jeffrey O. Kephart, Steve R. White, Directed-graph epidemiological models of computer viruses, in: Proceedings of the 1991 IEEE Computer Society Symposium on Research in Security and Privacy, April, 2002, pp. 343-359.
-
-
-
-
16
-
-
0037066427
-
The danger model: a renewed sense of self
-
Matzinger P. The danger model: a renewed sense of self. Science 296 (2002) 301-305
-
(2002)
Science
, vol.296
, pp. 301-305
-
-
Matzinger, P.1
-
18
-
-
0031684427
-
Combinatorial pattern discovery in biological sequences: the TEIRESIAS algorithm
-
Rigoutsos I., and Floratos A. Combinatorial pattern discovery in biological sequences: the TEIRESIAS algorithm. Bioinformatics 14 1 (1988)
-
(1988)
Bioinformatics
, vol.14
, Issue.1
-
-
Rigoutsos, I.1
Floratos, A.2
-
19
-
-
33846252645
-
-
W32/Sasser-A. Web page at , May, 2004.
-
-
-
-
20
-
-
33846194112
-
-
Morton Swimmer, Malware Intrusion Detection, Ph.D. thesis, University of Hamburg, Fachbereich Informatik Hamburg, Germany, June, 2005.
-
-
-
-
21
-
-
0034836394
-
Intrusion detection via static analysis
-
IEEE Computer Society, Los Alamitos, CA, USA
-
Wagner D., and Dean D. Intrusion detection via static analysis. Proceedings of the 2001 IEEE Symposium on Security and Privacy (S&P-01) (2001), IEEE Computer Society, Los Alamitos, CA, USA 156-169
-
(2001)
Proceedings of the 2001 IEEE Symposium on Security and Privacy (S&P-01)
, pp. 156-169
-
-
Wagner, D.1
Dean, D.2
|