-
1
-
-
84867715914
-
-
http://discovery.csc.ncsu.edu/software/correlator/
-
-
-
-
2
-
-
84867691364
-
-
http://www.cisco.com/warp/public/cc/pd/sqsw/sqidsz/
-
-
-
-
3
-
-
84867710436
-
-
http://www.enterasys.com/products/ids/
-
-
-
-
4
-
-
84867691365
-
-
http://www.imperva.com/products/securesphere/
-
-
-
-
5
-
-
84867691242
-
-
http://www.iss.net
-
-
-
-
6
-
-
84867691362
-
-
http://www.prelude-ids.org
-
-
-
-
7
-
-
33751017631
-
Immune system approaches to intrusion detection - A review
-
In: LNCS 3239 Springer-Verlag, Catania, Italy
-
Aickelin U, Greensmith J and Twycross J (2004) Immune system approaches to intrusion detection - a review. In: Proceedings ICARIS-2004, 3rd International Conference on Artificial Immune Systems, LNCS 3239, pp. 316-329, Springer-Verlag, Catania, Italy
-
(2004)
Proceedings ICARIS-2004, 3rd International Conference on Artificial Immune Systems
, pp. 316-329
-
-
Aickelin, U.1
Greensmith, J.2
Twycross, J.3
-
8
-
-
35248825128
-
Danger theory: The link between ais and ids
-
Aickelin U, Bentley P, Cayzer S, Kim J and McLeod J (2003) Danger theory: The link between ais and ids. In: Proceedings of the Second International Conference on Artificial Immune Systems (ICARIS-03), pp. 147-155
-
(2003)
Proceedings of the Second International Conference on Artificial Immune Systems (ICARIS-03)
, pp. 147-155
-
-
Aickelin, U.1
Bentley, P.2
Cayzer, S.3
Kim, J.4
McLeod, J.5
-
9
-
-
21244478589
-
The danger theory and its application to ais
-
In: Timmis J and Bentley PJ (eds) University of Kent at Canterbury, UK, September 2002 University of Kent at Canterbury Printing Unit
-
Aickelin U and Cayzer S (2002) The danger theory and its application to ais. In: Timmis J and Bentley PJ (eds) Proceeding of the First International Conference on Artificial Immune System (ICARIS-2002), University of Kent at Canterbury, UK, September 2002, pp. 141-148. University of Kent at Canterbury Printing Unit.
-
(2002)
Proceeding of the First International Conference on Artificial Immune System (ICARIS-2002)
, pp. 141-148
-
-
Aickelin, U.1
Cayzer, S.2
-
11
-
-
1442290852
-
Negative selection: How to generate detectors
-
In: Timmis J and Bentley P (eds) Cantebury, UK, September 2002
-
Ayara M, Timmis J, de Lemos R, de Castro LN and Duncan R (2002) Negative selection: How to generate detectors. In: Timmis J and Bentley P (eds) Proceedings of the 1st International Conference on Artificial Immune Systems (ICARIS'-02), Cantebury, UK, September 2002, pp. 89-98
-
(2002)
Proceedings of the 1st International Conference on Artificial Immune Systems (ICARIS'-02)
, pp. 89-98
-
-
Ayara, M.1
Timmis, J.2
de Lemos, R.3
de Castro, L.N.4
Duncan, R.5
-
15
-
-
84904336851
-
A scaled, immunological approach to anomaly countermeasures (combining ph with cfengine)
-
Begnum K and Burgess M (2003) A scaled, immunological approach to anomaly countermeasures (combining ph with cfengine). Integrated Network Management, pp. 31-42
-
(2003)
Integrated Network Management
, pp. 31-42
-
-
Begnum, K.1
Burgess, M.2
-
16
-
-
26944493329
-
Two ways to grow tissue for artificial immune systems
-
In: Jacob C, Pilat MJ, Bentley PJ and Timmis J (eds) Lecture Notes in Computer Science, Banff, Alta., Canada, August 2005 Springer
-
Bentley P, Greensmith J and Ujin S (2005) Two ways to grow tissue for artificial immune systems. In: Jacob C, Pilat MJ, Bentley PJ and Timmis J (eds) Proceeding of the 4th International Conference on Artificial Immune Systems (ICARIS-2005), Vol. 3627, Lecture Notes in Computer Science, Banff, Alta., Canada, August 2005, pp. 139-152. Springer
-
(2005)
Proceeding of the 4th International Conference on Artificial Immune Systems (ICARIS-2005)
, vol.3627
, pp. 139-152
-
-
Bentley, P.1
Greensmith, J.2
Ujin, S.3
-
17
-
-
0003408496
-
-
Irvine, CA: University of California, Department of Information and Computer Science
-
Blake CL and Merz CJ (1998) Uci repository of machine learning databases. http://www.ics.uci.edu/mlearn/MLRepository.htm. Irvine, CA: University of California, Department of Information and Computer Science
-
(1998)
Uci Repository of Machine Learning Databases
-
-
Blake, C.L.1
Merz, C.J.2
-
23
-
-
84959039793
-
Two dimensional time-series for anomaly detection and regulation in adaptive systems
-
In: Feridum M et al. (eds) Lecture Notes in Computer Science Springer-Verlag
-
Burgess M (2002) Two dimensional time-series for anomaly detection and regulation in adaptive systems. In: Feridum M et al. (eds) Proceedings of 13th IFIP/IEEE International Workshop on Distributed System, Operations and Management (DSOM 2002), Vol. 2506, Lecture Notes in Computer Science, pp. 169-180. Springer-Verlag
-
(2002)
Proceedings of 13th IFIP/IEEE International Workshop on Distributed System, Operations and Management (DSOM 2002)
, vol.2506
, pp. 169-180
-
-
Burgess, M.1
-
24
-
-
2442625568
-
Configurable immunity for evolving human-computer systems
-
Burgess M (2004) Configurable immunity for evolving human-computer systems. Science of Computer Programming 51:197-213
-
(2004)
Science of Computer Programming
, vol.51
, pp. 197-213
-
-
Burgess, M.1
-
25
-
-
15544363043
-
Principle components and importance ranking of distributed anomalies
-
Burgess M (2004) Principle components and importance ranking of distributed anomalies. Machine Learning 58: 217-230
-
(2004)
Machine Learning
, vol.58
, pp. 217-230
-
-
Burgess, M.1
-
26
-
-
30344486259
-
Probabilistic anomaly detection in distributed computer networks
-
Burgess M (2006) Probabilistic anomaly detection in distributed computer networks. Science of Computer Programming 60: 1-26
-
(2006)
Science of Computer Programming
, vol.60
, pp. 1-26
-
-
Burgess, M.1
-
31
-
-
0036613083
-
An immunity-based technique to characterize intrusions in computer networks
-
Dasgupta D, Gonzalez F (2002) An immunity-based technique to characterize intrusions in computer networks. IEEE Transactions on Evolutionary Computation 6(3):281-291
-
(2002)
IEEE Transactions on Evolutionary Computation
, vol.6
, Issue.3
, pp. 281-291
-
-
Dasgupta, D.1
Gonzalez, F.2
-
33
-
-
4344660279
-
An intrusion detection system using ideas from the immune system
-
In: Portland, OR, USA, June 2004
-
de Paula FS, de Castro LN and de Geus PL (2004) An intrusion detection system using ideas from the immune system. In: Proceeding of IEEE Congress on Evolutionary Computation (CEC-2004), Portland, OR, USA, June 2004, pp. 1059-1066
-
(2004)
Proceeding of IEEE Congress on Evolutionary Computation (CEC-2004)
, pp. 1059-1066
-
-
de Paula, F.S.1
de Castro, L.N.2
de Geus, P.L.3
-
36
-
-
0029724599
-
An immunological approach to change detection: Theoretical results
-
In: Washington, DC, USA IEEE Computer Society
-
D'haeseleer P, Forrest S and Helman P (1996) An immunological approach to change detection: Theoretical results. In: Proceedings of the 9th IEEE Computer Security Foundations Workshop, Washington, DC, USA, pp. 18-27. IEEE Computer Society
-
(1996)
Proceedings of the 9th IEEE Computer Security Foundations Workshop
, pp. 18-27
-
-
D'haeseleer, P.1
Forrest, S.2
Helman, P.3
-
37
-
-
0029718285
-
An immunology approach to change detection: Algorithm, analysis and implications
-
In: Los Alamitos, CA IEEE Computer Society
-
D'haeseleer P, Forrest S and Helman P (1996) An immunology approach to change detection: Algorithm, analysis and implications. In: Proceeding of 1996 IEEE Symposium on Computer Security and Privacy, Los Alamitos, CA, pp. 110-119. IEEE Computer Society
-
(1996)
Proceeding of 1996 IEEE Symposium on Computer Security and Privacy
, pp. 110-119
-
-
D'haeseleer, P.1
Forrest, S.2
Helman, P.3
-
38
-
-
35048839283
-
Vulnerability analysis of immunity-based intrusion detection systems using evolutionary hackers
-
In: Deb K et al. (eds) Part I, Lecture Notes in Computer Science, Seattle, WA, USA, 26-30 June 2004, ISGEC, Springer-Verlag
-
Dozier G, Brown D, Hurley J and Cain K (2004) Vulnerability analysis of immunity-based intrusion detection systems using evolutionary hackers. In: Deb K et al. (eds) Genetic and Evolutionary Computation - GECCO-2004, Part I, Vol. 3102, Lecture Notes in Computer Science, Seattle, WA, USA, 26-30 June 2004, pp. 263-274. ISGEC, Springer-Verlag
-
(2004)
Genetic and Evolutionary Computation - GECCO-2004
, vol.3102
, pp. 263-274
-
-
Dozier, G.1
Brown, D.2
Hurley, J.3
Cain, K.4
-
39
-
-
21244476388
-
On the use of negative selection in an artificial immune system
-
In: New York, USA, July 2002 Morgan Kaufmann
-
Ebner M, Breunig H and Albert J (2002) On the use of negative selection in an artificial immune system. In: Proceedings of GECCO-2002, New York, USA, July 2002, pp. 957-964. Morgan Kaufmann
-
(2002)
Proceedings of GECCO-2002
, pp. 957-964
-
-
Ebner, M.1
Breunig, H.2
Albert, J.3
-
41
-
-
33751021639
-
The crossover closure and partial match detection
-
In: Timmis J, Bentley P and Hart E (eds) Lecture Notes in Computer Science, Edinburgh, UK, September 2003 Springer-Verlag
-
Esponda F, Forrest S and Helman P (2003) The crossover closure and partial match detection. In: Timmis J, Bentley P and Hart E (eds) Proceedings of the 2nd International Conference on Artificial Immune Systems (ICARIS'-03), Vol. 2787, Lecture Notes in Computer Science, Edinburgh, UK, September 2003, pp. 249-260. Springer-Verlag
-
(2003)
Proceedings of the 2nd International Conference on Artificial Immune Systems (ICARIS'-03)
, vol.2787
, pp. 249-260
-
-
Esponda, F.1
Forrest, S.2
Helman, P.3
-
42
-
-
0742324903
-
A formal framework for positive and negative detection schemes
-
Esponda F, Forrest S, Helman P (2004) A formal framework for positive and negative detection schemes. IEEE Transactions on Systems, Man, and Cybernetics Part B Cybernetics 34(1):357-373
-
(2004)
IEEE Transactions on Systems, Man, and Cybernetics Part B Cybernetics
, vol.34
, Issue.1
, pp. 357-373
-
-
Esponda, F.1
Forrest, S.2
Helman, P.3
-
43
-
-
24644520611
-
Unsupervised anomaly detection based on an evolutionary artificial immune network
-
In: Rothlauf F et al. (eds) Lecture Notes in Computer Science Springer
-
Fang L and Le-Ping L (2005) Unsupervised anomaly detection based on an evolutionary artificial immune network. In: Rothlauf F et al. (eds) Proceeding of Applications of Evolutionary Computing, EvoWorkshops-2005, Vol. 3449, Lecture Notes in Computer Science, pp. 166-174. Springer
-
(2005)
Proceeding of Applications of Evolutionary Computing, EvoWorkshops-2005
, vol.3449
, pp. 166-174
-
-
Fang, L.1
Le-Ping, L.2
-
44
-
-
46149127936
-
The immune system, adaptation and machine learning
-
Farmer JD, Packard NH, Perelson AS (1986) The immune system, adaptation and machine learning. Physica D 22:187-204
-
(1986)
Physica D
, vol.22
, pp. 187-204
-
-
Farmer, J.D.1
Packard, N.H.2
Perelson, A.S.3
-
46
-
-
21244465997
-
How do we evaluate artificial immune systems?
-
Garrett SM (2005) How do we evaluate artificial immune systems?. Evolutionary Computation, 13(2):145-178
-
(2005)
Evolutionary Computation
, vol.13
, Issue.2
, pp. 145-178
-
-
Garrett, S.M.1
-
47
-
-
21244441082
-
A machine learning evaluation of an artificial immune system
-
Glickman M, Balthrop J, Forrest S (2005) A machine learning evaluation of an artificial immune system. Evolutionary Computation 13(2):179-212
-
(2005)
Evolutionary Computation
, vol.13
, Issue.2
, pp. 179-212
-
-
Glickman, M.1
Balthrop, J.2
Forrest, S.3
-
50
-
-
15744364465
-
A study of artificial immune systems applied to anomaly detection
-
PhD thesis, The University of Memphis, May 2003
-
Gonzalez F (2003) A study of artificial immune systems applied to anomaly detection. PhD thesis, The University of Memphis, May 2003
-
(2003)
-
-
Gonzalez, F.1
-
51
-
-
35248820180
-
The effect of binary matching rules in negative selection
-
In: Lecture Notes in Computer Science, July 2003 Springer-Verlag
-
Gonzalez F, Dagupta D and Gomez J (2003) The effect of binary matching rules in negative selection. In: Proceedings of the Genetic and Evolutionary Computation Conference (GECCO)-2003, Vol. 2723, Lecture Notes in Computer Science, July 2003, pp. 198-209. Springer-Verlag
-
(2003)
Proceedings of the Genetic and Evolutionary Computation Conference (GECCO)-2003
, vol.2723
, pp. 198-209
-
-
Gonzalez, F.1
Dagupta, D.2
Gomez, J.3
-
52
-
-
35248816526
-
A randomized real-valued negative selection algorithm
-
In: Timmis J, Bentley P and Hart E (eds) Lecture Notes in Comupter Science, Edinburgh, UK, September 2003 Springer
-
Gonzalez F, Dagupta D and Nino LF (2003) A randomized real-valued negative selection algorithm. In: Timmis J, Bentley P and Hart E (eds) Proceedings of the 2nd International Conference on Artificial Immune Systems (ICARIS-2003), Vol. 2787, Lecture Notes in Comupter Science, Edinburgh, UK, September 2003, pp. 261-272. Springer
-
(2003)
Proceedings of the 2nd International Conference on Artificial Immune Systems (ICARIS-2003)
, vol.2787
, pp. 261-272
-
-
Gonzalez, F.1
Dagupta, D.2
Nino, L.F.3
-
53
-
-
84901440662
-
Combining negative selection and classification techniques for anomaly detection
-
In: IEEE (ed) Honolulu, HI, May 2002
-
Gonzalez F, Dasgupta D and Kozma R (2002) Combining negative selection and classification techniques for anomaly detection. In: IEEE (ed) Proceedings of the Congress on Evolutionary Computation (CEC-2002), Honolulu, HI, May 2002, pp. 705-710
-
(2002)
Proceedings of the Congress on Evolutionary Computation (CEC-2002)
, pp. 705-710
-
-
Gonzalez, F.1
Dasgupta, D.2
Kozma, R.3
-
56
-
-
32444446071
-
Discriminating and visualizing anomalies using negative selection and self-organizing maps
-
In: Beyer H-G et al. (eds) Washington DC, USA, 25-29, June 2005 ACM SIGEVO (formerly ISGEC), ACM Press
-
Gonzalez FA, Galeano JC, Rojas DA and Veloza-Suan A (2005) Discriminating and visualizing anomalies using negative selection and self-organizing maps. In: Beyer H-G et al. (eds) GECCO 2005: Proceedings of the 2005 Conference on Genetic and Evolutionary Computation, Vol. 1, Washington DC, USA, 25-29, June 2005, pp. 297-304. ACM SIGEVO (formerly ISGEC), ACM Press
-
(2005)
GECCO 2005: Proceedings of the 2005 Conference on Genetic and Evolutionary Computation
, vol.1
, pp. 297-304
-
-
Gonzalez, F.A.1
Galeano, J.C.2
Rojas, D.A.3
Veloza-Suan, A.4
-
58
-
-
26944469543
-
Introducing dendritic cells as a novel immune inspired algorithm for anomaly detection
-
In: Jacob C, Pilat MJ, Bentley PJ and Timmis J (eds) Lecture Notes in Computer Science, Banff, Alberta, Canada, August 2005 Springer
-
Greensmith J, Aickelin U and Cayzer S (2005) Introducing dendritic cells as a novel immune inspired algorithm for anomaly detection. In: Jacob C, Pilat MJ, Bentley PJ and Timmis J (eds) Proceeding of the 4th International Conference on Artificial Immune Systems (ICARIS-2005), Vol. 3627, Lecture Notes in Computer Science, Banff, Alberta, Canada, August 2005, pp. 153-167. Springer
-
(2005)
Proceeding of the 4th International Conference on Artificial Immune Systems (ICARIS-2005)
, vol.3627
, pp. 153-167
-
-
Greensmith, J.1
Aickelin, U.2
Cayzer, S.3
-
59
-
-
34547523883
-
Constructing detectors in schema complementary spce for anomaly detection
-
In: Deb K et al. (eds) Lecture Notes in Computer Science Springer-Verlag
-
Hang X and Dai H (2004) Constructing detectors in schema complementary spce for anomaly detection. In: Deb K et al. (eds) Proceedings of GECCO'2004, Vol. 3102, Lecture Notes in Computer Science, pp. 275-286. Springer-Verlag
-
(2004)
Proceedings of GECCO'2004
, vol.3102
, pp. 275-286
-
-
Hang, X.1
Dai, H.2
-
60
-
-
32444435567
-
Applying both positive and negative selection to supervised learning for anomaly detection
-
In: Beyer H-G et al. (eds) Washington DC, USA, 25-29 June 2005 ACM SIGEVO (formerly ISGEC), ACM Press
-
Hang X and Dai H (2005) Applying both positive and negative selection to supervised learning for anomaly detection. In: Beyer H-G et al. (eds) GECCO 2005: Proceedings of the 2005 Conference on Genetic and Evolutionary Computation, Vol. 1, Washington DC, USA, 25-29 June 2005, pp. 345-352. ACM SIGEVO (formerly ISGEC), ACM Press
-
(2005)
GECCO 2005: Proceedings of the 2005 Conference on Genetic and Evolutionary Computation
, vol.1
, pp. 345-352
-
-
Hang, X.1
Dai, H.2
-
61
-
-
0036613003
-
An artificial immune system architecture for computer security applications
-
Harmer PK, Williams PD, Gunsch GH, Lamont GB (2002) An artificial immune system architecture for computer security applications. IEEE Transactions on Evolutionary Computation 6(3):252-280
-
(2002)
IEEE Transactions on Evolutionary Computation
, vol.6
, Issue.3
, pp. 252-280
-
-
Harmer, P.K.1
Williams, P.D.2
Gunsch, G.H.3
Lamont, G.B.4
-
62
-
-
0003496659
-
An immunological model of distributed detection and its application to computer security
-
PhD thesis, University Of New Mexico
-
Hofmeyr S (1999) An immunological model of distributed detection and its application to computer security. PhD thesis, University Of New Mexico
-
(1999)
-
-
Hofmeyr, S.1
-
63
-
-
0032313923
-
Intrusion detection using sequences of system calls
-
Hofmeyr S, Forrest S (1998) Intrusion detection using sequences of system calls. Journal of Computer Security 6:151-180
-
(1998)
Journal of Computer Security
, vol.6
, pp. 151-180
-
-
Hofmeyr, S.1
Forrest, S.2
-
65
-
-
0002467033
-
Architecture for an artificial immune system
-
Hofmeyr S, Forrest S (2000) Architecture for an artificial immune system. Evolutionary Computation 7(1):45-68
-
(2000)
Evolutionary Computation
, vol.7
, Issue.1
, pp. 45-68
-
-
Hofmeyr, S.1
Forrest, S.2
-
67
-
-
0344083606
-
An artificial immune system for securing mobile ad hoc networks against intrusion attacks
-
In: Priddy KL and Angeline PJ (eds) Intelligent Computing: Theory and Applications
-
Hortos WS (2003) An artificial immune system for securing mobile ad hoc networks against intrusion attacks. In: Priddy KL and Angeline PJ (eds) Proceeding of SPIE, Vol. 5103, Intelligent Computing: Theory and Applications, pp. 74-91
-
(2003)
Proceeding of SPIE
, vol.5103
, pp. 74-91
-
-
Hortos, W.S.1
-
68
-
-
33644537355
-
Immunity-based intrusion detection system design, vulnerability analysis, and the genertia genetic arms race
-
In: Haddad H et al. (eds) Santa Fe, New Mexico, 13-17 March 2005 ACM Press
-
Hou H and Dozier G (2005) Immunity-based intrusion detection system design, vulnerability analysis, and the genertia genetic arms race. In: Haddad H et al. (eds) Proceedings of the 2005 ACM Symposium on Applied Computing, Santa Fe, New Mexico, 13-17 March 2005, pp. 961-965. ACM Press
-
(2005)
Proceedings of the 2005 ACM Symposium on Applied Computing
, pp. 961-965
-
-
Hou, H.1
Dozier, G.2
-
69
-
-
35448964499
-
-
Technical Report Annual Report, A010, Computer Science Laboratory, SRI International, Menlo Park, CA, March 1994
-
Jackson K, DuBois D and Stallings C (1994) The nides statistical component description and justification Technical Report Annual Report, A010, Computer Science Laboratory, SRI International, Menlo Park, CA, March 1994
-
(1994)
The Nides Statistical Component Description and Justification
-
-
Jackson, K.1
DuBois, D.2
Stallings, C.3
-
70
-
-
0000047098
-
Towards a network theory of the immune system
-
Jerne NK (1974) Towards a network theory of the immune system. Annals of Immunology
-
(1974)
Annals of Immunology
-
-
Jerne, N.K.1
-
71
-
-
4344597939
-
Augmented negative selection algorithm with variable-coverage detectors
-
In: Portland, Oregon (U.S.A.), June 2004
-
Ji Z and Dasgupta D (2004) Augmented negative selection algorithm with variable-coverage detectors. In: Proceedings of Congress on Evolutionary Computation (CEC-04), Portland, Oregon (U.S.A.), June 2004, pp. 1081-1088
-
(2004)
Proceedings of Congress on Evolutionary Computation (CEC-04)
, pp. 1081-1088
-
-
Ji, Z.1
Dasgupta, D.2
-
72
-
-
26944471838
-
Real-valued negative selection using variable-sized detectors
-
In: Deb K et al. (eds) Lecture Notes in Computer Science, Seattle, WA, June 2004 Springer-Verlag
-
Ji Z and Dasgupta D (2004) Real-valued negative selection using variable-sized detectors. In: Deb K et al. (eds) Proceeding of Genetic and Evolutionary Computation Conference (GECCO-2004), Lecture Notes in Computer Science, Seattle, WA, June 2004, pp. 287-298. Springer-Verlag
-
(2004)
Proceeding of Genetic and Evolutionary Computation Conference (GECCO-2004)
, pp. 287-298
-
-
Ji, Z.1
Dasgupta, D.2
-
73
-
-
32444438530
-
Estimating the detector coverage in a negative selection algorithm
-
In: Beyer H-G et al. (eds) Washington, DC, USA, 25-29 June 2005 ACM SIGEVO (formerly ISGEC), ACM Press
-
Ji Z and Dasgupta D (2005) Estimating the detector coverage in a negative selection algorithm. In: Beyer H-G et al. (eds) GECCO 2005: Proceedings of the 2005 Conference on Genetic and Evolutionary Computation, Vol. 1, Washington, DC, USA, 25-29 June 2005, pp. 281-288. ACM SIGEVO (formerly ISGEC), ACM Press
-
(2005)
GECCO 2005: Proceedings of the 2005 Conference on Genetic and Evolutionary Computation
, vol.1
, pp. 281-288
-
-
Ji, Z.1
Dasgupta, D.2
-
74
-
-
33751015379
-
A peer-to-peer blacklisting strategy inspired by leukocyte-endothelium interaction
-
In: Jacob C, Pilat ML, Bentley PJ and Timmis J (eds) Lecture Notes in Computer Science, Banff, Alta., Canada, August 2005 Springer
-
Trapnell BC Jr (2005) A peer-to-peer blacklisting strategy inspired by leukocyte-endothelium interaction. In: Jacob C, Pilat ML, Bentley PJ and Timmis J (eds) Proceedings of the 4th International Conference on Artificial Immune Systems-2005, Vol. 3627, Lecture Notes in Computer Science, Banff, Alta., Canada, August 2005, pp. 362-373. Springer
-
(2005)
Proceedings of the 4th International Conference on Artificial Immune Systems-2005
, vol.3627
, pp. 362-373
-
-
Trapnell Jr., B.C.1
-
75
-
-
35248895863
-
The effect of antibody morphology on non-self detection
-
In: Timmis J, Bentley P and Verrelst H (eds) Lecture Notes on Computer Science, Edinburgh, UK, September 2003 Springer-Verlag
-
Kaers J, Wheeler R and Verrelst H (2003) The effect of antibody morphology on non-self detection. In: Timmis J, Bentley P and Verrelst H (eds) Proceedings of the 2nd International Conference on Artificial Immune Systems (ICARIS-03), Vol. 2787, Lecture Notes on Computer Science, Edinburgh, UK, September 2003, pp. 285-295. Springer-Verlag
-
(2003)
Proceedings of the 2nd International Conference on Artificial Immune Systems (ICARIS-03)
, vol.2787
, pp. 285-295
-
-
Kaers, J.1
Wheeler, R.2
Verrelst, H.3
-
77
-
-
77957993065
-
-
Machie Learning and Data Mining: Method and Applications. John-Wiley & Son
-
Kephart JO, Sorkin GB, Arnold WC, Chess DM, Teasuro GJ and White SR (1997) Biologically Inspired Defences against Computer Viruses, pp. 313-334. Machie Learning and Data Mining: Method and Applications. John-Wiley & Son
-
(1997)
Biologically Inspired Defences Against Computer Viruses
, pp. 313-334
-
-
Kephart, J.O.1
Sorkin, G.B.2
Arnold, W.C.3
Chess, D.M.4
Teasuro, G.J.5
White, S.R.6
-
82
-
-
0038458266
-
Evaluating negative selection in an artificial immune system for network intrusion detection
-
In: July 2001
-
Kim J and Bentley P (2001) Evaluating negative selection in an artificial immune system for network intrusion detection. In: Proceedings of GECCO, July 2001, pp. 1330-1337
-
(2001)
Proceedings of GECCO
, pp. 1330-1337
-
-
Kim, J.1
Bentley, P.2
-
83
-
-
84901408225
-
Towards an artificial immune system for network intrusion detection: An investigation of dynamic clonal selection
-
In: Honolulu, Hawaii, May 2002
-
Kim J and Bentley P (2002) Towards an artificial immune system for network intrusion detection: An investigation of dynamic clonal selection. In: Proceeding of the Congress on Evolutionary Computation (CEC-2002), Honolulu, Hawaii, May 2002, pp. 1015-1020
-
(2002)
Proceeding of the Congress on Evolutionary Computation (CEC-2002)
, pp. 1015-1020
-
-
Kim, J.1
Bentley, P.2
-
84
-
-
3543122436
-
Immune memory and gene library evolution in the dynamical clonal selection algorithm
-
Kim J, Bentley P (2004) Immune memory and gene library evolution in the dynamical clonal selection algorithm. Journal of Genetic Programming and Evolvable Machines 5(4):361-391
-
(2004)
Journal of Genetic Programming and Evolvable Machines
, vol.5
, Issue.4
, pp. 361-391
-
-
Kim, J.1
Bentley, P.2
-
85
-
-
0034870039
-
Towards an artificial immune system for network intrusion detection: An investigation of clonal selection with a negative selection operator
-
In: Seoul, Korea
-
Kim J and Bentley PJ (2001) Towards an artificial immune system for network intrusion detection: An investigation of clonal selection with a negative selection operator. In: Proceeding of the Congress on Evolutionary Computation (CEC- 2001), Seoul, Korea, pp. 1244-1252
-
(2001)
Proceeding of the Congress on Evolutionary Computation (CEC- 2001)
, pp. 1244-1252
-
-
Kim, J.1
Bentley, P.J.2
-
87
-
-
26944468992
-
Cooperative automated worm response and detection immune algorithm (cardinal) inspidred by t-cell immunity and tolerance
-
In: Jacob C, Pilat MJ, Bentley PJ and Timmis J (eds) Lecture Notes in Computer Science, Banff, Alta., Canada, August 2005 Springer
-
Kim J, Wilson W, Aickelin U and McLeod J (2005) Cooperative automated worm response and detection immune algorithm (cardinal) inspidred by t-cell immunity and tolerance. In: Jacob C, Pilat MJ, Bentley PJ and Timmis J (eds) Proceeding of the 4th National Conference on Artificial Immune Systems (ICARIS-2005), Vol. 3627, Lecture Notes in Computer Science, Banff, Alta., Canada, August 2005, pp. 168-181. Springer
-
(2005)
Proceeding of the 4th National Conference on Artificial Immune Systems (ICARIS-2005)
, vol.3627
, pp. 168-181
-
-
Kim, J.1
Wilson, W.2
Aickelin, U.3
McLeod, J.4
-
88
-
-
0242498985
-
Integrating Artificial Immune Algorithms for Intrusion Detection
-
PhD thesis, University College London
-
Kim JW (2002) Integrating Artificial Immune Algorithms for Intrusion Detection. PhD thesis, University College London
-
(2002)
-
-
Kim, J.W.1
-
89
-
-
35448998638
-
-
Lincoln Labs MIT Lincoln Labs
-
Lincoln Labs (1999) dataset. MIT Lincoln Labs
-
(1999)
Dataset
-
-
-
90
-
-
0009950263
-
-
New Ideas in Optimization, Advanced Topics in Computer Science Series. McGrow-Hill, London
-
Lamont GB, Marmelstein RE and Van Veldhuizen DA (1999) A Distributed Architecture for a Self-Adaptive Computer Virus Immune System, pp. 167-183. New Ideas in Optimization, Advanced Topics in Computer Science Series. McGrow-Hill, London
-
(1999)
A Distributed Architecture for a Self-Adaptive Computer Virus Immune System
, pp. 167-183
-
-
Lamont, G.B.1
Marmelstein, R.E.2
Van Veldhuizen, D.A.3
-
92
-
-
35448994124
-
-
Technical Report 02-04, Department of Computer Engineering, Chalmers University of Technology, Goteborg, Sweden, January 2002
-
Lundin E and Jonsson E (2002) Survey of research in the intrusion detection area. Technical Report 02-04, Department of Computer Engineering, Chalmers University of Technology, Goteborg, Sweden, January 2002
-
(2002)
Survey of Research in the Intrusion Detection Area
-
-
Lundin, E.1
Jonsson, E.2
-
94
-
-
33646178879
-
Immunocomputing model of intrusion detection
-
In: MMM-ACNS 2003, St. Petersburg, Russia, 21-23 September 2003, Proceedings
-
Melnikov Y and Tarakanov AO (2003) Immunocomputing model of intrusion detection. In: Computer Network Security, Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2003, St. Petersburg, Russia, 21-23 September 2003, Proceedings, pp. 453-456
-
(2003)
Computer Network Security, Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security
, pp. 453-456
-
-
Melnikov, Y.1
Tarakanov, A.O.2
-
95
-
-
79958186026
-
Building attack scenarios through integration of complementary alert correlation method
-
Ning P, Xu D, Healey CG and Amant RS (2004) Building attack scenarios through integration of complementary alert correlation method. In: NDSS
-
(2004)
NDSS
-
-
Ning, P.1
Xu, D.2
Healey, C.G.3
Amant, R.S.4
-
96
-
-
0038223829
-
-
NIST NIST Computer Science Special Reports SP 800-31, November 2001
-
NIST (2001) Intrusion detection systems. NIST Computer Science Special Reports SP 800-31, November 2001
-
(2001)
Intrusion Detection Systems
-
-
-
101
-
-
35048854187
-
An artificial immune system for misbehavior detection in mobile ad-hoc networks with virtual thymus, clustering, danger signal and memory detectors
-
In: Catania, Italy, September 2004
-
Sarafijanovic S and Le Boudec J (2004) An artificial immune system for misbehavior detection in mobile ad-hoc networks with virtual thymus, clustering, danger signal and memory detectors. In: Proceedings of the 3rd International Conference on Artificial Immune Systems (ICARIS'-04), Catania, Italy, September 2004, pp. 342-356
-
(2004)
Proceedings of the 3rd International Conference on Artificial Immune Systems (ICARIS'-04)
, pp. 342-356
-
-
Sarafijanovic, S.1
Le Boudec, J.2
-
102
-
-
32444442909
-
An evolutionary algorithm to generate hyper-ellipsoid detectors for negative selection
-
In: Beyer H-G et al. (eds) Washington, DC, USA, 25-29 June 2005 ACM SIGEVO (formerly ISGEC), ACM Press
-
Shapiro JM, Lamont GB and Peterson GL (2005) An evolutionary algorithm to generate hyper-ellipsoid detectors for negative selection. In: Beyer H-G et al. (eds) GECCO 2005: Proceedings of the 2005 Conference on Genetic and Evolutionary Computation, Vol. 1, Washington, DC, USA, 25-29 June 2005, pp. 337-344. ACM SIGEVO (formerly ISGEC), ACM Press
-
(2005)
GECCO 2005: Proceedings of the 2005 Conference on Genetic and Evolutionary Computation
, vol.1
, pp. 337-344
-
-
Shapiro, J.M.1
Lamont, G.B.2
Peterson, G.L.3
-
103
-
-
1442339891
-
Anomaly detection using negative selection based on the r-contiguous matching rule
-
In: Timmis J and Bentley PJ (eds) Canterbury, UK, September 2002
-
Singh S (2002) Anomaly detection using negative selection based on the r-contiguous matching rule. In: Timmis J and Bentley PJ (eds) Proceedings of the 1st International Conference on Artificial Immune Systems (ICARIS'-02), Canterbury, UK, September 2002, pp. 99-106
-
(2002)
Proceedings of the 1st International Conference on Artificial Immune Systems (ICARIS'-02)
, pp. 99-106
-
-
Singh, S.1
-
104
-
-
0000190905
-
Searching for diverse, cooperative population with genetic algorithms
-
Smith RE, Forrest S, Perelson AS (1993) Searching for diverse, cooperative population with genetic algorithms. Evolutionary Computation 1(2):127-149
-
(1993)
Evolutionary Computation
, vol.1
, Issue.2
, pp. 127-149
-
-
Smith, R.E.1
Forrest, S.2
Perelson, A.S.3
-
107
-
-
0037781377
-
Operating system stability and security through process homeostasis
-
PhD thesis, University Of New Mexico
-
Somayaji AB (2002) Operating system stability and security through process homeostasis. PhD thesis, University Of New Mexico
-
(2002)
-
-
Somayaji, A.B.1
-
109
-
-
35048863919
-
An investigation of r-chunk detector generation on higher alphabets
-
In: Deb K et al. (eds) Lecture Notes in Computer Science
-
Stibor T, Bayarou KM and Eckert C (2004) An investigation of r-chunk detector generation on higher alphabets. In: Deb K et al. (eds) Proceedings of GECCO' 2004, Vol. 3102, Lecture Notes in Computer Science, pp. 299-307
-
(2004)
Proceedings of GECCO' 2004
, vol.3102
, pp. 299-307
-
-
Stibor, T.1
Bayarou, K.M.2
Eckert, C.3
-
110
-
-
32444436687
-
Is negative selection appropriate for anomaly detection?
-
In: Beyer H-G et al. (eds) Washington, DC, USA, 25-29 June 2005 ACM SIGEVO (formerly ISGEC), ACM Press
-
Stibor T, Mohr P, Timmis J and Eckert C (2005) Is negative selection appropriate for anomaly detection? In: Beyer H-G et al. (eds) GECCO 2005: Proceedings of the 2005 Conference on Genetic and Evolutionary Computation, Vol. 1, Washington, DC, USA, 25-29 June 2005, pp. 321-328. ACM SIGEVO (formerly ISGEC), ACM Press
-
(2005)
GECCO 2005: Proceedings of the 2005 Conference on Genetic and Evolutionary Computation
, vol.1
, pp. 321-328
-
-
Stibor, T.1
Mohr, P.2
Timmis, J.3
Eckert, C.4
-
111
-
-
26944442701
-
A comparative study of real-valued negative selection to statistical anomaly detection techniques
-
In: Jacob C, Pilat MJ, Bentley PJ and Timmis J (eds) Lecture Notes in Computer Science, Banff, Alta., Canada, August 2005 Springer
-
Stibor T, Timmis J and Eckert C (2005) A comparative study of real-valued negative selection to statistical anomaly detection techniques. In: Jacob C, Pilat MJ, Bentley PJ and Timmis J (eds) Proceedings of the 4th International Conference on Artificial Immune Systems (ICARIS-2005), Vol. 3627, Lecture Notes in Computer Science, Banff, Alta., Canada, August 2005, pp. 262-275. Springer
-
(2005)
Proceedings of the 4th International Conference on Artificial Immune Systems (ICARIS-2005)
, vol.3627
, pp. 262-275
-
-
Stibor, T.1
Timmis, J.2
Eckert, C.3
-
112
-
-
27144451393
-
On the appropriateness of negative selection defined over hamming shape-space as a network intrusion detection system
-
In: Edinburgh, UK, September 2005 IEEE Press
-
Stibor T, Timmis J and Eckert C (2005) On the appropriateness of negative selection defined over hamming shape-space as a network intrusion detection system. In: Proceedings of the Congress on Evolutionary Computation (CEC-2005), Edinburgh, UK, September 2005, pp. 995-1002. IEEE Press
-
(2005)
Proceedings of the Congress on Evolutionary Computation (CEC-2005)
, pp. 995-1002
-
-
Stibor, T.1
Timmis, J.2
Eckert, C.3
-
114
-
-
26944450016
-
Towards a conceptual framework for innate immunity
-
In: Jacob C, Pilat MJ, Bentley PJ and Timmis J (eds) Lecture Notes in Computer Science, Banff, Alta., Canada, August 2005 Springer
-
Twycross J and Aickelin U (2005) Towards a conceptual framework for innate immunity. In: Jacob C, Pilat MJ, Bentley PJ and Timmis J (eds) Proceeding of the 4th International Conference on Artificial Immune Systems (ICARIS-2005), Vol. 3627, Lecture Notes in Computer Science, Banff, Alta., Canada, August 2005, pp. 112-125. Springer
-
(2005)
Proceeding of the 4th International Conference on Artificial Immune Systems (ICARIS-2005)
, vol.3627
, pp. 112-125
-
-
Twycross, J.1
Aickelin, U.2
-
116
-
-
4243650504
-
-
White SR, Swimmer M, Pring EJ, Arnold WC, Chess DM and Morar JF (2000) Anatomy of a commercial-grade immune system. http://www.research.ibm.com/ antivirus/SciPapers.htm
-
(2000)
Anatomy of a Commercial-grade Immune System
-
-
White, S.R.1
Swimmer, M.2
Pring, E.J.3
Arnold, W.C.4
Chess, D.M.5
Morar, J.F.6
-
118
-
-
84868256861
-
-
Intelligent Information Systems, Advances in Soft Computing Series of Physica-Verlag. Physica-Verlag, Heidelberg, New York
-
Wierzchon ST (2000) Generating Optimal Repertoire of Antibody Strings in an Artificial Immune System, pp. 119-133. Intelligent Information Systems, Advances in Soft Computing Series of Physica-Verlag. Physica-Verlag, Heidelberg, New York
-
(2000)
Generating Optimal Repertoire of Antibody Strings in an Artificial Immune System
, pp. 119-133
-
-
Wierzchon, S.T.1
-
120
-
-
33745655877
-
Seurat: A pointillist approach to anomaly detection
-
In:
-
Xie Y, Kim H, O'Hallaron DR, Reiter MlK, Zhang H (2004) Seurat: A pointillist approach to anomaly detection. In: RAID, pp. 238-257
-
(2004)
RAID
, pp. 238-257
-
-
Xie, Y.1
Kim, H.2
O'Hallaron, D.R.3
Reiter, M.L.K.4
Zhang, H.5
-
121
-
-
0031652485
-
Glomosim: A library for parallel simulation of large scale wireless networks
-
In: Banff, Alberta, Canada, May 1998
-
Zeng X, Bagrodia R and Gerla M (1998) Glomosim: A library for parallel simulation of large scale wireless networks. In: Proceedings of the 12th Workshop on Parallel and Distributed Simulations (PDAS' 98), Banff, Alberta, Canada, May 1998
-
(1998)
Proceedings of the 12th Workshop on Parallel and Distributed Simulations (PDAS' 98)
-
-
Zeng, X.1
Bagrodia, R.2
Gerla, M.3
|