-
1
-
-
36749005256
-
-
Aickelin U, Cayzer S. The danger theory and its application to artificial immune systems, 2002.
-
-
-
-
2
-
-
77649313921
-
Challenges for autonomic network management
-
Multicon verlag. 3-930736-05-5
-
Agoulmine N., Balasubramaniam S., Botvich D., Strassner J., Lehtihet E., Donnelly W., et al. Challenges for autonomic network management. Proceedings of the first IEEE international workshop on modelling autonomic communications environments (MACE) (2006), Multicon verlag. 3-930736-05-5 9-28
-
(2006)
Proceedings of the first IEEE international workshop on modelling autonomic communications environments (MACE)
, pp. 9-28
-
-
Agoulmine, N.1
Balasubramaniam, S.2
Botvich, D.3
Strassner, J.4
Lehtihet, E.5
Donnelly, W.6
-
9
-
-
30344486259
-
Probabilistic anomaly detection in distributed computer networks
-
Burgess M. Probabilistic anomaly detection in distributed computer networks. Science of Computer Programming 60 1 (2006) 1-26
-
(2006)
Science of Computer Programming
, vol.60
, Issue.1
, pp. 1-26
-
-
Burgess, M.1
-
11
-
-
36749044483
-
-
British Standard/International Standard Organization. BS/ISO17799 Information technology - code of practice for information security management; 2000.
-
-
-
-
14
-
-
36749000191
-
-
Dasgupta D, Forrest S. An anomaly detection algorithm inspired by the immune system. In: Artificial immune systems and their applications; 1998. p. 262.
-
-
-
-
17
-
-
0000873984
-
Antnet: distributed stigmergetic control for communications networks
-
Di Caro G., and Dorigo M. Antnet: distributed stigmergetic control for communications networks. Journal of Artificial Intelligence Research 9 (1998) 317-365
-
(1998)
Journal of Artificial Intelligence Research
, vol.9
, pp. 317-365
-
-
Di Caro, G.1
Dorigo, M.2
-
18
-
-
0024663403
-
-
Eichin MW, Rochlis JA. With microscope and tweezer: an analysis of the Internet worm. In: Proceedings of 1989 IEEE Computer Society symposium on security and privacy; 1989. p. 326.
-
-
-
-
20
-
-
46149127936
-
The immune system, adaptation, and machine learning
-
Farmer J.D., Packard N.H., and Perelson A.S. The immune system, adaptation, and machine learning. Physica D 2 1-3 (1986) 187-204
-
(1986)
Physica D
, vol.2
, Issue.1-3
, pp. 187-204
-
-
Farmer, J.D.1
Packard, N.H.2
Perelson, A.S.3
-
21
-
-
77950988402
-
On concepts for autonomic communication elements
-
Multicon verlag. 3-930736-05-5
-
Höfig E., Wüst B., Benko B.K., Mannella A., Mamei M., Nitto E.D., et al. On concepts for autonomic communication elements. Proceedings of the first IEEE international workshop on modelling autonomic communications environments (MACE) (2006), Multicon verlag. 3-930736-05-5 49-59
-
(2006)
Proceedings of the first IEEE international workshop on modelling autonomic communications environments (MACE)
, pp. 49-59
-
-
Höfig, E.1
Wüst, B.2
Benko, B.K.3
Mannella, A.4
Mamei, M.5
Nitto, E.D.6
-
25
-
-
36749086124
-
-
Kephart JO, Chess DM. The vision of autonomic computing. Technical report. IBM Research; 2003. .
-
-
-
-
26
-
-
0028201732
-
Tolerance, danger and the extended family
-
Matzinger P. Tolerance, danger and the extended family. Annual Review of Immunology 12 (1994) 991
-
(1994)
Annual Review of Immunology
, vol.12
, pp. 991
-
-
Matzinger, P.1
-
27
-
-
58649089895
-
Emerging principles of autonomic network management. Challenges for autonomic network management
-
Multicon verlag. 3-930736-05-5
-
van der Meer S., Donnelly W., Strassner J., Jennings B., and Ó Foghlú M. Emerging principles of autonomic network management. Challenges for autonomic network management. Proceedings of the first IEEE international workshop on modelling autonomic communications environments (MACE) (2006), Multicon verlag. 3-930736-05-5 29-47
-
(2006)
Proceedings of the first IEEE international workshop on modelling autonomic communications environments (MACE)
, pp. 29-47
-
-
van der Meer, S.1
Donnelly, W.2
Strassner, J.3
Jennings, B.4
Ó Foghlú, M.5
-
31
-
-
80051517712
-
Implementing a generalized tool for network monitoring
-
USENIX Association, Berkeley, CA
-
Ranum M.J., Landfield K., Stolarchuk M., Sienkiewicz M., Lambeth A., and Wall E. Implementing a generalized tool for network monitoring. Proceedings of the eleventh systems administration conference (LISA XI) (1997), USENIX Association, Berkeley, CA 1
-
(1997)
Proceedings of the eleventh systems administration conference (LISA XI)
, pp. 1
-
-
Ranum, M.J.1
Landfield, K.2
Stolarchuk, M.3
Sienkiewicz, M.4
Lambeth, A.5
Wall, E.6
-
33
-
-
85084164032
-
-
Somayaji A, Forrest S. Automated response using system-call delays. In: Proceedings of the ninth USENIX security symposium; 2000. p. 185.
-
-
-
-
37
-
-
36749005789
-
-
TM forum (2005).
-
(2005)
TM forum
-
-
-
38
-
-
84880174811
-
-
Warrender C, Forrest S, Pearlmutter B. Detecting intrusions using system calls: alternative data models. In: Submitted to the 1999 IEEE symposium on security and privacy; 1999.
-
-
-
|