-
1
-
-
34249876861
-
-
Boudec JL, Sarafijanovic S. An artificial immune system approach to misbehavior detection in mobile ad-hoc networks. In: Proceedings of Bio-ADIT 2004 (The First International Workshop on Biologically Inspired Approaches to Advanced Information Technology); January 2004. p. 96-111.
-
-
-
-
2
-
-
2642537707
-
An artificial immune based intrusion detection model for computer and telecommunication systems
-
Boukerche A., Jucá K.R.L., Sobral J.B., and Notare M.S.M.A. An artificial immune based intrusion detection model for computer and telecommunication systems. Parallel Computer 30 5-6 (2004) 629-646
-
(2004)
Parallel Computer
, vol.30
, Issue.5-6
, pp. 629-646
-
-
Boukerche, A.1
Jucá, K.R.L.2
Sobral, J.B.3
Notare, M.S.M.A.4
-
3
-
-
34249882700
-
-
Centers for Disease Control and Prevention. Key facts about avian influenza (bird flu) and avian influenza A (H5N1) virus; June 2006a. Available from: http://www.cdc.gov/flu/avian/gen-info/facts.htm.
-
-
-
-
4
-
-
34249872961
-
-
Centers for Disease Control and Prevention. HIV/AIDS; January 2007. Available from: http://www.cdc.gov/hiv.
-
-
-
-
5
-
-
34249880087
-
-
Centers for Disease Control and Prevention, Influenza (flu); August 2006b. Available from: http://www.cdc.gov/flu.
-
-
-
-
6
-
-
34249867632
-
-
Centers for Disease Control and Prevention. Malaria; May 2004. Available from: http://www.cdc.gov/malaria.
-
-
-
-
7
-
-
34249872686
-
-
Centers for Disease Control and Prevention. Severe acute respiratory syndrome (SARS); May 2005. Available from: http://www.cdc.gov/NCIDOD/SARS/.
-
-
-
-
8
-
-
0003437009
-
-
Addison-Wesley, Reading, MA
-
Cheswick W.R., Bellovin S.M., and Rubin A.D. Firewalls and Internet Security; repelling the Wily Hacker. 2nd ed. (2003), Addison-Wesley, Reading, MA
-
(2003)
Firewalls and Internet Security; repelling the Wily Hacker. 2nd ed.
-
-
Cheswick, W.R.1
Bellovin, S.M.2
Rubin, A.D.3
-
10
-
-
0026216363
-
Bacterial pneumonia in persons infected with the human immunodeficiency virus
-
Cohn D. Bacterial pneumonia in persons infected with the human immunodeficiency virus. Infectious Disease Clinics of North America 5 3 (September 1991) 485-507
-
(1991)
Infectious Disease Clinics of North America
, vol.5
, Issue.3
, pp. 485-507
-
-
Cohn, D.1
-
11
-
-
34249913140
-
-
Computer Emergency Response Team. CERT advisory CA-2001-26 Nimda worm; September 2001a. Available from: http://www.cert.org/advisories/CA-2001-26.html.
-
-
-
-
12
-
-
34249869492
-
-
Computer Emergency Response Team. CERT incident note IN-2001-09 Code Red II: another worm exploiting buffer overflow in IIS indexing service DLL; August 2001b. Available from: http://www.cert.org/incident_notes/IN-2001-09.html.
-
-
-
-
13
-
-
34249869790
-
-
Computer Emergency Response Team. CERT incident note IN-2003-03 W32/SoBig.F worm; August 2003a. Available from: http://www.cert.org/incident_notes/IN-2003-03.html.
-
-
-
-
14
-
-
34249891037
-
-
Computer Emergency Response Team. CERT advisory CA-2003-20 W32/Blaster worm; August 2003b. Available from: http://www.cert.org/advisories/CA-2003-20.html.
-
-
-
-
15
-
-
0027961889
-
Self-nonself discrimination in a computer
-
IEEE Computer Society, Washington, DC, USA
-
Forrest S., Perelson A.S., Allen L., and Cherukuri R. Self-nonself discrimination in a computer. Proceedings of the 1994 IEEE symposium on security and privacy (1994), IEEE Computer Society, Washington, DC, USA 202
-
(1994)
Proceedings of the 1994 IEEE symposium on security and privacy
, pp. 202
-
-
Forrest, S.1
Perelson, A.S.2
Allen, L.3
Cherukuri, R.4
-
16
-
-
0030697765
-
-
Forrest S, Somayaji A, Ackley DH. Building diverse computer systems. In: Workshop on hot topics in operating systems; 1997a. p. 67-72.
-
-
-
-
18
-
-
17844404852
-
Malicious bots threaten network security
-
Geer D. Malicious bots threaten network security. IEEE Computer 38 1 (January 2005) 18-20
-
(2005)
IEEE Computer
, vol.38
, Issue.1
, pp. 18-20
-
-
Geer, D.1
-
19
-
-
27144474904
-
Large-scale sequencing of human influenza reveals the dynamic nature of viral genome evolution
-
Available from:
-
Ghedin E., Sengamalay N.A., Shumway M., Zaborsky J., Feldblyum T., Subbu V., et al. Large-scale sequencing of human influenza reveals the dynamic nature of viral genome evolution. Nature (October 2005). http://dx.doi.org/10.1038/nature04239 Available from:
-
(2005)
Nature
-
-
Ghedin, E.1
Sengamalay, N.A.2
Shumway, M.3
Zaborsky, J.4
Feldblyum, T.5
Subbu, V.6
-
20
-
-
34247387359
-
Biological models of security for virus propagation in computer networks
-
Goel S., and Bush S.F. Biological models of security for virus propagation in computer networks. LOGIN 29 6 (December 2004) 49-56
-
(2004)
LOGIN
, vol.29
, Issue.6
, pp. 49-56
-
-
Goel, S.1
Bush, S.F.2
-
21
-
-
26844555602
-
Addressing the monoculture
-
Goth G. Addressing the monoculture. IEEE Security and Privacy November-December (2003) 8-10
-
(2003)
IEEE Security and Privacy
, vol.November-December
, pp. 8-10
-
-
Goth, G.1
-
22
-
-
34249864108
-
-
Hofmeyr SA. An immunological model of distributed detection and its application to computer security. Ph.D. dissertation, University of New Mexico; May 1999 [Adviser: Stephanie Forrest].
-
-
-
-
23
-
-
34249900687
-
-
Immunization Action Coalition. Complacency the likely cause of measles epidemic in the seattle area; October 2002. Available from: http://www.immunize.org/reports/report051.asp.
-
-
-
-
24
-
-
34249903309
-
-
Joint United Nations Programme on HIV/AIDS. AIDS epidemic update 2005; December 2005. Available from: http://www.unaids.org/epi/2005/.
-
-
-
-
25
-
-
34249875941
-
-
Keizer G. Symantec anti-virus software open to attack. In: TechWeb technology news; 20 December 2005. Available from: http://www.techweb.com/wire/security/175007129.
-
-
-
-
26
-
-
0026156688
-
-
Kephart JO, White SR. Directed-graph epidemiological models of computer viruses. In: Proceedings of IEEE symposium on security and privacy; May 1991. p. 343-61.
-
-
-
-
27
-
-
0027150413
-
-
Kephart JO, White SR. Measuring and modeling computer virus prevalence. In: Proceedings of the 1993 IEEE symposium on research in security and privacy; 1993. p. 2-15.
-
-
-
-
28
-
-
34249904360
-
-
Kephart JO, Sorkin GB, Arnold WC, Chess DM, Tesauro GJ, White SR. Biologically inspired defenses against computer viruses. In: Proceedings of international joint conference on artificial intelligence; 1995. p. 985-96.
-
-
-
-
29
-
-
33845709033
-
Defense mechanisms of biological cells: a framework for network security thinking
-
Knapp K., Morris F., Rainer Jr. R.K., and Byrd T.A. Defense mechanisms of biological cells: a framework for network security thinking. Communications of the Association for Information Systems 12 47 (2003) 701-719
-
(2003)
Communications of the Association for Information Systems
, vol.12
, Issue.47
, pp. 701-719
-
-
Knapp, K.1
Morris, F.2
Rainer Jr., R.K.3
Byrd, T.A.4
-
30
-
-
34249865581
-
-
Lewis R. The rise of antibiotic-resistant infections; September 1995. Available from: http://www.fda.gov/fdac/features/795_antibio.html.
-
-
-
-
31
-
-
0742269305
-
Resilient self-organizing overlay networks for security update delivery
-
Li J., Reiher P.L., and Popek G.J. Resilient self-organizing overlay networks for security update delivery. IEEE Journal on Selected Areas in Communications, Special Issue on Service Overlay Networks 22 1 (January 2004) 189-202
-
(2004)
IEEE Journal on Selected Areas in Communications, Special Issue on Service Overlay Networks
, vol.22
, Issue.1
, pp. 189-202
-
-
Li, J.1
Reiher, P.L.2
Popek, G.J.3
-
32
-
-
34249915269
-
-
Li J, Stafford S, Ehrenkranz T. SWORD: self-propagating worm observation and rapid detection, University of Oregon. Technical Report CIS-TR-2006-03; 2006.
-
-
-
-
33
-
-
2942603135
-
Topography as a contextual variable in infectious disease transmission
-
Montoya I.D. Topography as a contextual variable in infectious disease transmission. Clinical Laboratory Science (Spring 2004)
-
(2004)
Clinical Laboratory Science
-
-
Montoya, I.D.1
-
34
-
-
34249873754
-
-
Moore D, Shannon C, Claffy K. Code-red: a case study on the spread and victims of an Internet worm. In Proceedings of ACM Internet measurement workshop; 2002.
-
-
-
-
35
-
-
0023997770
-
The application of epidemiology to computer viruses
-
Murray W.H. The application of epidemiology to computer viruses. Computer Security 7 (1998) 139-150
-
(1998)
Computer Security
, vol.7
, pp. 139-150
-
-
Murray, W.H.1
-
36
-
-
34249888163
-
-
National Institute of Allergy and Infectious Diseases. Tuberculosis; March 2006. Available from: http://www.niaid.nih.gov/factsheets/tb.htm.
-
-
-
-
37
-
-
0016555241
-
The protection of information in computer systems
-
Saltzer J., and Schroeder M. The protection of information in computer systems. Proceedings of the IEEE 53 9 (September 1975) 1278-1308
-
(1975)
Proceedings of the IEEE
, vol.53
, Issue.9
, pp. 1278-1308
-
-
Saltzer, J.1
Schroeder, M.2
-
39
-
-
84955618043
-
BASIS: a biological approach to system information security
-
Springer-Verlag, London, UK
-
Skormin V.A., Delgado-Frias J.G., McGee D.L., Giordano J., Popyack L.J., Gorodetski V.I., et al. BASIS: a biological approach to system information security. MMM-ACNS '01: proceedings of the international workshop on information assurance in computer networks (2001), Springer-Verlag, London, UK 127-142
-
(2001)
MMM-ACNS '01: proceedings of the international workshop on information assurance in computer networks
, pp. 127-142
-
-
Skormin, V.A.1
Delgado-Frias, J.G.2
McGee, D.L.3
Giordano, J.4
Popyack, L.J.5
Gorodetski, V.I.6
-
40
-
-
0024681099
-
The Internet worm: crisis and aftermath
-
Spafford E. The Internet worm: crisis and aftermath. Communications of the ACM 32 6 (June 1989) 678-687
-
(1989)
Communications of the ACM
, vol.32
, Issue.6
, pp. 678-687
-
-
Spafford, E.1
-
41
-
-
0001795825
-
Computer viruses-a form of artificial life?
-
Langton C.G., Taylor C., Farmer J.D., and Rasmussen S. (Eds), Addison-Wesley, Redwood City, CA
-
Spafford E.H. Computer viruses-a form of artificial life?. In: Langton C.G., Taylor C., Farmer J.D., and Rasmussen S. (Eds). Artificial life II (1992), Addison-Wesley, Redwood City, CA 727-745
-
(1992)
Artificial life II
, pp. 727-745
-
-
Spafford, E.H.1
-
42
-
-
85084162258
-
-
Staniford S, Paxson V, Weaver N. How to own the Internet in your spare time. In: Proceedings of USENIX security symposium; August 2002.
-
-
-
-
43
-
-
0033019384
-
Estimation of serial interval and incubation period of tuberculosis using dna fingerprinting
-
ten Asbroek A., Borgdorff M., Nagelkerke N., Sebek M., Devillé W., van Embden J., et al. Estimation of serial interval and incubation period of tuberculosis using dna fingerprinting. The International Journal of Tuberculosis and Lung Disease 3 5 (May 1999) 414-420
-
(1999)
The International Journal of Tuberculosis and Lung Disease
, vol.3
, Issue.5
, pp. 414-420
-
-
ten Asbroek, A.1
Borgdorff, M.2
Nagelkerke, N.3
Sebek, M.4
Devillé, W.5
van Embden, J.6
-
44
-
-
12244311689
-
A taxonomy of computer worms
-
ACM Press, New York, NY, USA p. 11-8
-
Weaver N., Paxson V., Staniford S., and Cunningham R. A taxonomy of computer worms. Proceedings of workshop on rapid malcode (2003), ACM Press, New York, NY, USA p. 11-8
-
(2003)
Proceedings of workshop on rapid malcode
-
-
Weaver, N.1
Paxson, V.2
Staniford, S.3
Cunningham, R.4
-
45
-
-
34249866454
-
-
Williamson MM, Léveillé J. An epidemiological model of virus spread and cleanup 2003. Available from: http://www.hpl.hp.com/techreports/2003/HPL-2003-39.html.
-
-
-
-
46
-
-
0029279295
-
Travel and the emergence of infectious diseases
-
Wilson M.E. Travel and the emergence of infectious diseases. Emerging Infectious Diseases 1 (1995) 39-46
-
(1995)
Emerging Infectious Diseases
, vol.1
, pp. 39-46
-
-
Wilson, M.E.1
-
47
-
-
34249915021
-
-
World Health Organization. World Health Organization report on infectious disease-removing obstacles to healthy development. 1999. Available from: http://www.who.int/infectious-disease-report/index-rpt99.html.
-
-
-
-
48
-
-
34249866158
-
-
World Health Organization. World Health Organization report on infectious diseases. April 2002. Available from: http://www.who.int/infectious-disease-report.
-
-
-
-
49
-
-
34249879228
-
-
World Health Organization & United Nations Children's Fund. Measles: mortality reduction and regional elimination. Strategic plan 2001-2005; March 2003. Available from: http://www.who.int/vaccines-documents.
-
-
-
-
50
-
-
34249905167
-
-
World Health Organization. Roll Back Malaria Department, Malaria control today: current WHO recommendations. Geneva, Switzerland; March 2005a. Available from: http://www.who.int/malaria/docs/MCT_workingpaper.pdf.
-
-
-
-
51
-
-
34249878968
-
-
World Health Organization. The treatment of diarrhea-a manual for physicians and other senior health workers; 2005b. Available from: http://www.who.int/child-adolescent-health/New_Publications/CHILD_HEALTH/ISBN_92_4_159318_0.pdf.
-
-
-
-
52
-
-
24344483199
-
-
Yu W, Boyer C, Chellappan S, Xuan D. Peer-to-peer system-based active worm attacks: modeling and analysis. In: Proceedings of IEEE international conference on communications (ICC); May 2005.
-
-
-
-
53
-
-
33646065329
-
-
Zhou L, Zhang L, McSherry F, Immorlica N, Costa M, Chien S. A first look at peer-to-peer worms: threats and defenses. In: Proceedings of international workshop on peer-to-peer systems; 2005. p. 24-35.
-
-
-
|