-
2
-
-
0345389037
-
-
The MITRE Corporation available at: http://www.mitre.org/support/papers/archive01.shtml (August 2001)
-
Bloedorn E., Christiansen A.D., Hill W., Skorupka C., Talbot L.M., and Tivel J. Data Mining for Network Intrusion Detection: How to Get Started (2001), The MITRE Corporation. http://www.mitre.org/support/papers/archive01.shtml available at: http://www.mitre.org/support/papers/archive01.shtml (August 2001)
-
(2001)
Data Mining for Network Intrusion Detection: How to Get Started
-
-
Bloedorn, E.1
Christiansen, A.D.2
Hill, W.3
Skorupka, C.4
Talbot, L.M.5
Tivel, J.6
-
6
-
-
35048839283
-
Vulnerability analysis of immunity-based intrusion detection systems using evolutionary hackers
-
Seattle, WA (Springer; best paper award)
-
Dozier G., Brown D., Hurley J., and Cain K. Vulnerability analysis of immunity-based intrusion detection systems using evolutionary hackers. The Proceedings of the 2004 Genetic and Evolutionary Computation Conference (GECCO-2004), LNCS 3102, June. Seattle, WA (2004) 263-274 (Springer; best paper award)
-
(2004)
The Proceedings of the 2004 Genetic and Evolutionary Computation Conference (GECCO-2004), LNCS 3102, June
, pp. 263-274
-
-
Dozier, G.1
Brown, D.2
Hurley, J.3
Cain, K.4
-
7
-
-
4344625682
-
Vulnerability analysis of AIS-based intrusion detection systems via genetic and particle swarm red teams
-
Portland, OR
-
Dozier G., Brown D., Hurley J., and Cain K. Vulnerability analysis of AIS-based intrusion detection systems via genetic and particle swarm red teams. The Proceedings of the 2004 Congress on Evolutionary Computation (CEC2004), June 19-23. Portland, OR (2004) 111-116
-
(2004)
The Proceedings of the 2004 Congress on Evolutionary Computation (CEC2004), June 19-23
, pp. 111-116
-
-
Dozier, G.1
Brown, D.2
Hurley, J.3
Cain, K.4
-
9
-
-
0002511642
-
An overview of artificial immune systems and their applications
-
Dasgupta D. (Ed), Springer
-
Dasgupta D. An overview of artificial immune systems and their applications. In: Dasgupta D. (Ed). Artificial Immune Systems and Their Applications (1999), Springer 3-21
-
(1999)
Artificial Immune Systems and Their Applications
, pp. 3-21
-
-
Dasgupta, D.1
-
10
-
-
0036613083
-
An immunity-based technique to characterize intrusions in computer networks
-
(IEEE Press)
-
Dasgupta D., and Gonzalez F. An immunity-based technique to characterize intrusions in computer networks. IEEE Trans. Evol. Comput. 6 3 (2002) 281-291 (IEEE Press)
-
(2002)
IEEE Trans. Evol. Comput.
, vol.6
, Issue.3
, pp. 281-291
-
-
Dasgupta, D.1
Gonzalez, F.2
-
12
-
-
0002819121
-
A comparative analysis of selection schemes used in genetic algorithms
-
Rawlins G.J.E. (Ed), Morgan Kaufmann Publishers
-
Goldberg D.E., and Deb K. A comparative analysis of selection schemes used in genetic algorithms. In: Rawlins G.J.E. (Ed). Foundations of Genetic Algorithms (1989), Morgan Kaufmann Publishers 69-93
-
(1989)
Foundations of Genetic Algorithms
, pp. 69-93
-
-
Goldberg, D.E.1
Deb, K.2
-
13
-
-
33846799724
-
-
S. Hofmeyr, An Immunological Model of Distributed Detection and Its Application to Computer Security, PhD Dissertation, Department of Computer Science, The University of New Mexico, 1999.
-
-
-
-
15
-
-
0002467033
-
Architecture for an artificial immune system
-
Hofmeyr S., and Forrest S. Architecture for an artificial immune system. Evol. Comput. 7 1 (1999) 45-68
-
(1999)
Evol. Comput.
, vol.7
, Issue.1
, pp. 45-68
-
-
Hofmeyr, S.1
Forrest, S.2
-
18
-
-
33846806339
-
-
H. Hou, Artificial Immunity for Computer Network with Constraint-Based Detector, Masters Thesis, Department of Computer Science and Software Engineering, Auburn University, 2002.
-
-
-
-
26
-
-
84957039800
-
-
A. Somayaji, S. Hofmeyr, S. Forrest, Principles of a Computer Immune System, The New Security Paradigm Workshop, 1997, pp. 75-82.
-
-
-
-
27
-
-
33846817729
-
-
A.J. Stewart, Distributed Metastasis: A Computer Network Penetration Methodology, 1999, available at: http://www.citeseer.nj.nec.com/387640.html.
-
-
-
-
29
-
-
33846806338
-
-
J. Zhu, Use of an Immune Model to Improve Intrusion Detection on Dynamic Broadcast Local Area Networks, Masters Thesis, Department of Computer Science & Software Engineering, Auburn University, 2002.
-
-
-
|