메뉴 건너뛰기




Volumn 12, Issue 4, 2007, Pages 192-199

Biology, immunology and information security

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTATION THEORY; PROBLEM SOLVING; SECURITY SYSTEMS; SOFTWARE ENGINEERING; USER INTERFACES;

EID: 36749002714     PISSN: 13634127     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.istr.2007.10.005     Document Type: Article
Times cited : (6)

References (40)
  • 1
    • 36749005256 scopus 로고    scopus 로고
    • Aickelin U, Cayzer S. The danger theory and its application to artificial immune systems, 2002.
  • 9
    • 30344486259 scopus 로고    scopus 로고
    • Probabilistic anomaly detection in distributed computer networks
    • Burgess M. Probabilistic anomaly detection in distributed computer networks. Science of Computer Programming 60 1 (2006) 1-26
    • (2006) Science of Computer Programming , vol.60 , Issue.1 , pp. 1-26
    • Burgess, M.1
  • 11
    • 36749044483 scopus 로고    scopus 로고
    • British Standard/International Standard Organization. BS/ISO17799 Information technology - code of practice for information security management; 2000.
  • 14
    • 36749000191 scopus 로고    scopus 로고
    • Dasgupta D, Forrest S. An anomaly detection algorithm inspired by the immune system. In: Artificial immune systems and their applications; 1998. p. 262.
  • 17
    • 0000873984 scopus 로고    scopus 로고
    • Antnet: distributed stigmergetic control for communications networks
    • Di Caro G., and Dorigo M. Antnet: distributed stigmergetic control for communications networks. Journal of Artificial Intelligence Research 9 (1998) 317-365
    • (1998) Journal of Artificial Intelligence Research , vol.9 , pp. 317-365
    • Di Caro, G.1    Dorigo, M.2
  • 18
    • 0024663403 scopus 로고    scopus 로고
    • Eichin MW, Rochlis JA. With microscope and tweezer: an analysis of the Internet worm. In: Proceedings of 1989 IEEE Computer Society symposium on security and privacy; 1989. p. 326.
  • 20
    • 46149127936 scopus 로고
    • The immune system, adaptation, and machine learning
    • Farmer J.D., Packard N.H., and Perelson A.S. The immune system, adaptation, and machine learning. Physica D 2 1-3 (1986) 187-204
    • (1986) Physica D , vol.2 , Issue.1-3 , pp. 187-204
    • Farmer, J.D.1    Packard, N.H.2    Perelson, A.S.3
  • 25
    • 36749086124 scopus 로고    scopus 로고
    • Kephart JO, Chess DM. The vision of autonomic computing. Technical report. IBM Research; 2003. .
  • 26
    • 0028201732 scopus 로고
    • Tolerance, danger and the extended family
    • Matzinger P. Tolerance, danger and the extended family. Annual Review of Immunology 12 (1994) 991
    • (1994) Annual Review of Immunology , vol.12 , pp. 991
    • Matzinger, P.1
  • 33
    • 85084164032 scopus 로고    scopus 로고
    • Somayaji A, Forrest S. Automated response using system-call delays. In: Proceedings of the ninth USENIX security symposium; 2000. p. 185.
  • 37
    • 36749005789 scopus 로고    scopus 로고
    • TM forum (2005).
    • (2005) TM forum
  • 38
    • 84880174811 scopus 로고    scopus 로고
    • Warrender C, Forrest S, Pearlmutter B. Detecting intrusions using system calls: alternative data models. In: Submitted to the 1999 IEEE symposium on security and privacy; 1999.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.