메뉴 건너뛰기




Volumn 57, Issue , 2007, Pages 129-154

Immune-inspired algorithm for anomaly detection

Author keywords

[No Author keywords available]

Indexed keywords


EID: 34248380806     PISSN: 1860949X     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-3-540-71078-3_5     Document Type: Article
Times cited : (8)

References (22)
  • 2
    • 0030728480 scopus 로고    scopus 로고
    • Dendritic cell development: Multiple pathways to nature's adjuvants
    • Shortman K. Caux C. Dendritic cell development: Multiple pathways to nature's adjuvants. Stem Cells, 15:409-419, (1997).
    • (1997) Stem Cells , vol.15 , pp. 409-419
    • Shortman, K.1    Caux, C.2
  • 3
    • 0030642188 scopus 로고    scopus 로고
    • Dendritic cells and t lymphocytes: Developmental and functional interactions
    • Shortman K. Caux C. Dendritic cells and t lymphocytes: Developmental and functional interactions. Ciba Found Symp, 204:130-141, (1997).
    • (1997) Ciba Found Symp , vol.204 , pp. 130-141
    • Shortman, K.1    Caux, C.2
  • 5
    • 34248362488 scopus 로고    scopus 로고
    • Artificial immune systems a new computational intelligence approach
    • deCastro L. N. and Timmis J. Artificial immune systems a new computational intelligence approach. Springer, (2002).
    • (2002) Springer
    • deCastro, L.N.1    Timmis, J.2
  • 8
    • 0348135024 scopus 로고    scopus 로고
    • Dendritic-cell control of pathogen-driven t-cell polarization
    • December
    • Martien L. Kapsenberg. Dendritic-cell control of pathogen-driven t-cell polarization. Nature Reviews in Immunology, 3:984-993, December (2003).
    • (2003) Nature Reviews in Immunology , vol.3 , pp. 984-993
    • Kapsenberg, M.L.1
  • 9
    • 4243483478 scopus 로고    scopus 로고
    • Throttling viruses. restricting propagation to defeat malicious mobile code
    • Bristol, HPL-2002-172
    • Williamson M. M. Throttling viruses. restricting propagation to defeat malicious mobile code. Technical Report of HP Laboratories Bristol, HPL-2002-172, 2002.
    • (2002) Technical Report of HP Laboratories
    • Williamson, M.M.1
  • 10
    • 0034210009 scopus 로고    scopus 로고
    • Anderson C. Matzinger P. Danger: The view from the bottom of the cliff. Seminars in Immunology, 12(3):231-238, 2000.
    • Anderson C. Matzinger P. Danger: The view from the bottom of the cliff. Seminars in Immunology, 12(3):231-238, 2000.
  • 11
    • 0032191916 scopus 로고    scopus 로고
    • An innate sense of danger
    • Matzinger P. An innate sense of danger. Seminars in Immunology, 10(5):399-415, (1998).
    • (1998) Seminars in Immunology , vol.10 , Issue.5 , pp. 399-415
    • Matzinger, P.1
  • 12
    • 0037066427 scopus 로고    scopus 로고
    • The danger model: A renewed sense of self
    • Matzinger P. The danger model: A renewed sense of self. Science, 296:301-305, (2002).
    • (2002) Science , vol.296 , pp. 301-305
    • Matzinger, P.1
  • 13
    • 0032538522 scopus 로고    scopus 로고
    • G. J. et al. Randolph. Differentiation of monocytes into dendritic cells in a model of transendothelial trafficking see comments. Science, 282:480-483, (1998).
    • G. J. et al. Randolph. Differentiation of monocytes into dendritic cells in a model of transendothelial trafficking see comments. Science, 282:480-483, (1998).
  • 14
    • 0027532161 scopus 로고
    • Predicting the size of the t-cell receptor and antibody combining region from consideration of efficient self non-self discrimination
    • Percus Jerome K. Ora E. Alan S. Predicting the size of the t-cell receptor and antibody combining region from consideration of efficient self non-self discrimination. Proceedings of the National Academy of Sciences of the United States of America, 90:1691-1695, (1993).
    • (1993) Proceedings of the National Academy of Sciences of the United States of America , vol.90 , pp. 1691-1695
    • Percus Jerome, K.1    Ora, E.2    Alan, S.3
  • 16
    • 34248346403 scopus 로고    scopus 로고
    • Aickelin U. and Cayzer S. The danger theory and its application to artificial immune systems. In proceedings of The First International Conference on Artificial Immune Systems (ICARIS 2002), pages 141-148, (2002).
    • Aickelin U. and Cayzer S. The danger theory and its application to artificial immune systems. In proceedings of The First International Conference on Artificial Immune Systems (ICARIS 2002), pages 141-148, (2002).
  • 18
    • 13944266065 scopus 로고    scopus 로고
    • No driving without a license
    • William R. Heath Jose A. Villadangos. No driving without a license. Nature Immunology, 6(2):125-126, (2005).
    • (2005) Nature Immunology , vol.6 , Issue.2 , pp. 125-126
    • Heath, W.R.1    Villadangos, J.A.2
  • 19
    • 0037105912 scopus 로고    scopus 로고
    • Intrusion detection with mobile agents
    • Jansen W. Intrusion detection with mobile agents. Computer Communications, 25(15), (2002).
    • (2002) Computer Communications , vol.25 , Issue.15
    • Jansen, W.1
  • 21
    • 33646825370 scopus 로고    scopus 로고
    • An immune system inspired approach of collaborative intrusion detection system using mobile agents in wireless adhoc network
    • Ki-Won Yeom and Ji-Hyung Park. An immune system inspired approach of collaborative intrusion detection system using mobile agents in wireless adhoc network. Lecture Notes in Artificial Intelligence, 3802:204-211, (2005).
    • (2005) Lecture Notes in Artificial Intelligence , vol.3802 , pp. 204-211
    • Yeom, K.1    Park, J.2
  • 22
    • 0015619335 scopus 로고
    • Identification of a novel cell type in peripheral lymphoid organs of mice
    • Steinman R. Cohn Z. Identification of a novel cell type in peripheral lymphoid organs of mice. The Journal of Experimental Medicine, 137:1142-1162, (1973).
    • (1973) The Journal of Experimental Medicine , vol.137 , pp. 1142-1162
    • Steinman, R.1    Cohn, Z.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.