-
1
-
-
33750972259
-
Revisiting LISYS: Parameters and normal behavior
-
Balthrop, J., Forrest, S. and Glickman, M. "Revisiting LISYS: Parameters and Normal Behavior", Proceedings of the 2002 Congress on Evolutionary Computation, 1045-1050, (2002).
-
(2002)
Proceedings of the 2002 Congress on Evolutionary Computation
, pp. 1045-1050
-
-
Balthrop, J.1
Forrest, S.2
Glickman, M.3
-
2
-
-
3543128182
-
Coverage and generalization in an artificial immune system
-
Balthrop, J., Esponda, F., Forrest, S., Glickman, M. "Coverage and generalization in an Artificial Immune System", Proceedings of the 2002 Genetic and Evolutionary Computation Conference, (2002).
-
(2002)
Proceedings of the 2002 Genetic and Evolutionary Computation Conference
-
-
Balthrop, J.1
Esponda, F.2
Forrest, S.3
Glickman, M.4
-
5
-
-
0027961889
-
Self-nonself discrimination in a computer
-
Forrest, S., Perelson, S., Allen, L. and Cherukuri, R. "Self-nonself discrimination in a computer", Proceeding of the 1994 IEEE Symposium on Research in Security and Privacy, (1994).
-
(1994)
Proceeding of the 1994 IEEE Symposium on Research in Security and Privacy
-
-
Forrest, S.1
Perelson, S.2
Allen, L.3
Cherukuri, R.4
-
6
-
-
0029716418
-
A sense of self for unix processes
-
Forrest, S., Hofmeyr, S., Somayaji, A., and Longstaff, T. "A Sense of Self for Unix Processes". Proceedings of IEEE Symposium on Security and Privacy, 120-128 (1996).
-
(1996)
Proceedings of IEEE Symposium on Security and Privacy
, pp. 120-128
-
-
Forrest, S.1
Hofmeyr, S.2
Somayaji, A.3
Longstaff, T.4
-
8
-
-
0002320533
-
Immunity by design: An artificial immune system
-
Hofmeyr, S., and Forrest, S. "Immunity by Design: An Artificial Immune System", Proceedings of the 1999 Genetic and Evolutionary Computation Conference, pp, 1289-1296, (1999).
-
(1999)
Proceedings of the 1999 Genetic and Evolutionary Computation Conference
, pp. 1289-1296
-
-
Hofmeyr, S.1
Forrest, S.2
-
9
-
-
0002467033
-
Architecture for an artificial immune system
-
Hofmeyr, S., and Forrest, S. "Architecture for an Artificial Immune System", Evolutionary Computation, 7(1):45-68, (1999).
-
(1999)
Evolutionary Computation
, vol.7
, Issue.1
, pp. 45-68
-
-
Hofmeyr, S.1
Forrest, S.2
-
10
-
-
1642343496
-
Artificial immunity using constraint-based detectors
-
Hou, H., Zhu, J., and Dozier, G. "Artificial Immunity using Constraint-based Detectors", Proceedings of the 2002 World Automation Congress, 13:239-244, (2002).
-
(2002)
Proceedings of the 2002 World Automation Congress
, vol.13
, pp. 239-244
-
-
Hou, H.1
Zhu, J.2
Dozier, G.3
-
12
-
-
0028430224
-
Network intrusion detection
-
Mukherjee, B., Heberlein, T., and Levitt, K. "Network Intrusion Detection", IEEE Network, 8(3):26-41, (1994).
-
(1994)
IEEE Network
, vol.8
, Issue.3
, pp. 26-41
-
-
Mukherjee, B.1
Heberlein, T.2
Levitt, K.3
-
13
-
-
0032155668
-
The distributed constraint satisfaction problem: Formalization and algorithms
-
Yokoo, M., Durfee, E., Ishida, T., Kuwabara, K. "The Distributed Constraint Satisfaction Problem: Formalization and Algorithms", IEEE Transaction on Knowledge and Data Engineering, 10(5):673-685, (1998).
-
(1998)
IEEE Transaction on Knowledge and Data Engineering
, vol.10
, Issue.5
, pp. 673-685
-
-
Yokoo, M.1
Durfee, E.2
Ishida, T.3
Kuwabara, K.4
|