-
1
-
-
0009902369
-
-
Springer-Verlag, London, September
-
L. N. de Castro, J. Timmis, Artificial immune systems: a new computational intelligence approach, Springer-Verlag, London, September, 2002
-
(2002)
Artificial immune systems: A new computational intelligence approach
-
-
de Castro, L.N.1
Timmis, J.2
-
2
-
-
27944473064
-
-
People's Medical Publish House, Beijing, In Chinese
-
Zhenzhou Long, Medical Immunology, People's Medical Publish House, Beijing, 1996 (In Chinese)
-
(1996)
Medical Immunology
-
-
Long, Z.1
-
4
-
-
0028430224
-
Network intrusion detection
-
Mukherjee, B. Heberlein, L. T. Levitt, "Network intrusion detection," IEEE Network, Vol.8, pp.26-41, 1994
-
(1994)
IEEE Network
, vol.8
, pp. 26-41
-
-
Mukherjee, B.1
-
5
-
-
0033892448
-
Mobile agents and Java mobile agents toolkits
-
Hawaii, Jan
-
D. Horvat, D. Cvetkovic, V. Milutinovic, P. Kocovic, and V. Kovacevic, "Mobile agents and Java mobile agents toolkits," Proceedings of the 33rd Annual Hawaii International Conference on System Sciences, Hawaii, Jan. 2000, pp.10
-
(2000)
Proceedings of the 33rd Annual Hawaii International Conference on System Sciences
, pp. 10
-
-
Horvat, D.1
Cvetkovic, D.2
Milutinovic, V.3
Kocovic, P.4
Kovacevic, V.5
-
6
-
-
3042589970
-
Mobile Agents in Intrusion Detection and Response
-
Ottawa, Canada, Jane
-
W. Jansen, P. Mell, T. Karygiannis, and D. Marks, "Mobile Agents in Intrusion Detection and Response," Proceedings of the 12th Annual Canadian Information Technology Security Symposium, Ottawa, Canada, Jane 2000, pp.1-11
-
(2000)
Proceedings of the 12th Annual Canadian Information Technology Security Symposium
, pp. 1-11
-
-
Jansen, W.1
Mell, P.2
Karygiannis, T.3
Marks, D.4
-
7
-
-
33847640790
-
Immunologic Responses Manipulation of AIS Agents
-
Proceedings of the third International Conference on Artificial Immune Systems ICARIS 2004, Catania, Sicily, Italy, Sep
-
Henry Y. K. Lau, and Vicky W. K. Wong, "Immunologic Responses Manipulation of AIS Agents," Proceedings of the third International Conference on Artificial Immune Systems (ICARIS 2004), Catania, Sicily, Italy, Sep. 2004, Lecture Notes in Computer Science, pp.65-79
-
(2004)
Lecture Notes in Computer Science
, pp. 65-79
-
-
Lau, H.Y.K.1
Wong, V.W.K.2
-
8
-
-
33750211702
-
The computer defense immune system: Current and future research in intrusion detection
-
May
-
Kevin P. Anchor, Paul D. Williams, Gregg H. Gunsch, and Gary B. Lamont, "The computer defense immune system: current and future research in intrusion detection," Proceedings of the 2002 Congress on Evolutionary Computation, May 2002, vol.2, pp.1027-1032
-
(2002)
Proceedings of the 2002 Congress on Evolutionary Computation
, vol.2
, pp. 1027-1032
-
-
Anchor, K.P.1
Williams, P.D.2
Gunsch, G.H.3
Lamont, G.B.4
-
9
-
-
0028754379
-
The immune mechanism, adaptation, learning for the multi agent system
-
6-10 Nov
-
Mitsumoto, Fukuda, and Arai, "The immune mechanism, adaptation, learning for the multi agent system," Proceedings of IEEE Symposium on Emerging Technologies and Factory Automation, 6-10 Nov. 1994, pp.446-453
-
(1994)
Proceedings of IEEE Symposium on Emerging Technologies and Factory Automation
, pp. 446-453
-
-
Mitsumoto, F.1
Arai2
-
10
-
-
84901408225
-
Towards an Artificial Immune System for Network Intrusion Detection: An Investigation of Dynamic Clonal Selection
-
Honolulu, May
-
J. Kim, and P. J. Bentley, "Towards an Artificial Immune System for Network Intrusion Detection: An Investigation of Dynamic Clonal Selection," Proceedings of the Congress on Evolutionary Computation (CEC-2002), Honolulu, May. 2002, pp.1015-1020
-
(2002)
Proceedings of the Congress on Evolutionary Computation (CEC-2002)
, pp. 1015-1020
-
-
Kim, J.1
Bentley, P.J.2
-
11
-
-
0038458266
-
Evaluating Negative Selection in an Artificial Immune System for Network Intrusion Detection
-
San Francisco, July 7-11
-
J. Kim, and P. J. Bentley, "Evaluating Negative Selection in an Artificial Immune System for Network Intrusion Detection," Proceedings of Genetic and Evolutionary Computation Conference (GECCO-2001), San Francisco, July 7-11, 2001, pp.1330-1337
-
(2001)
Proceedings of Genetic and Evolutionary Computation Conference (GECCO-2001)
, pp. 1330-1337
-
-
Kim, J.1
Bentley, P.J.2
-
12
-
-
0034870039
-
Towards an Artificial Immune System for Network Intrusion Detection: An Investigation of Clonal Selection with a Negative Selection Operator
-
Seoul, Korea, May 27-30
-
J. Kim, and P. J. Bentley, "Towards an Artificial Immune System for Network Intrusion Detection: An Investigation of Clonal Selection with a Negative Selection Operator," Proceedings of the Congress on Evolutionary Computation (CEC-2001), Seoul, Korea, May 27-30, 2001, pp.1244-1252
-
(2001)
Proceedings of the Congress on Evolutionary Computation (CEC-2001)
, pp. 1244-1252
-
-
Kim, J.1
Bentley, P.J.2
-
13
-
-
11844289195
-
The Artificial Immune Model for Network Intrusion Detection
-
Aachen, Germany, September 13-19
-
J. Kim, and P. J. Bentley, "The Artificial Immune Model for Network Intrusion Detection," Proceedings of 7th European Congress on Intelligent Techniques and Soft Computing (EUFIT'99), Aachen, Germany, September 13-19, 1999
-
(1999)
Proceedings of 7th European Congress on Intelligent Techniques and Soft Computing (EUFIT'99)
-
-
Kim, J.1
Bentley, P.J.2
-
14
-
-
33847096770
-
CIDS: Agent Architecture for Intrusion Detection and Response
-
Also available at
-
D. Dasgupta, F. Gonzalez, et al. "CIDS: Agent Architecture for Intrusion Detection and Response," Revised Submission to the journal on Computers & Security 2004. Also available at http://issrl.cs.memphis.edu/ papers/issrl/2004/cids.pdf.
-
(2004)
Revised Submission to the journal on Computers & Security
-
-
Dasgupta, D.1
Gonzalez, F.2
-
15
-
-
84964461159
-
Mobile Security Agents for Network Traffic Analysis
-
IEEE Computer Society Press, Anaheim, California, June 12-14
-
D. Dasgupta, and H. Brian, "Mobile Security Agents for Network Traffic Analysis," Proceedings of DARPA Information Survivability Conference and Exposition II (DISCEX-II), IEEE Computer Society Press, Anaheim, California, June 12-14, 2001, Vol.2, pp.332-340
-
(2001)
Proceedings of DARPA Information Survivability Conference and Exposition II (DISCEX-II)
, vol.2
, pp. 332-340
-
-
Dasgupta, D.1
Brian, H.2
-
17
-
-
0027961889
-
Self-Nonself Discrimination in a Computer
-
Oakland, CA, 16-18 May
-
S. Forrest, A. S. Perelson, L. Allen, R. Cherukuri, "Self-Nonself Discrimination in a Computer," Proceedings of IEEE Symposium on Research in Security and Privacy, Oakland, CA, 16-18 May 1994, pp.202-212
-
(1994)
Proceedings of IEEE Symposium on Research in Security and Privacy
, pp. 202-212
-
-
Forrest, S.1
Perelson, A.S.2
Allen, L.3
Cherukuri, R.4
-
18
-
-
84968627042
-
-
L. N. de Castro, Immune, swarm, and evolutionary algorithms part II: philosophical comparisons, Proceedings of the 2002 International Conference on Neural Information Processing, Workshop on Artificial Immune Systems, pp. 1469-1472
-
L. N. de Castro, "Immune, swarm, and evolutionary algorithms part II: philosophical comparisons," Proceedings of the 2002 International Conference on Neural Information Processing, Workshop on Artificial Immune Systems, pp. 1469-1472
-
-
-
-
19
-
-
33847100405
-
Evolutionary Negative Selection Algorithms for Anomaly Detection
-
Salt Lake City, Utah, July 21-26
-
Wenjian Luo, Xufa Wang, et al., "Evolutionary Negative Selection Algorithms for Anomaly Detection," Proceedings of the 7th International Conference on Computational Intelligence and Natural Computing (CINC'2005), Salt Lake City, Utah, July 21-26, 2005
-
(2005)
Proceedings of the 7th International Conference on Computational Intelligence and Natural Computing (CINC
-
-
Luo, W.1
Wang, X.2
|