-
1
-
-
35248825128
-
Danger theory: The link between ais and ids
-
Proceedings of the ICARIS-2003
-
U. Aickelin, P. Bentley, S. Cayzer, J. Kim, and J. McLeod. Danger theory: The link between ais and ids. In Proceedings of the ICARIS-2003, LNCS 2728, pages 147-155, 2003.
-
(2003)
LNCS
, vol.2728
, pp. 147-155
-
-
Aickelin, U.1
Bentley, P.2
Cayzer, S.3
Kim, J.4
McLeod, J.5
-
2
-
-
21244478589
-
The danger theory and its applications to artificial immune systems
-
U. Aickelin and S. Cayzer. The danger theory and its applications to artificial immune systems. In Proceedings of the ICARIS-2002, pages 141-148, 2002.
-
(2002)
Proceedings of the ICARIS-2002
, pp. 141-148
-
-
Aickelin, U.1
Cayzer, S.2
-
3
-
-
33751017631
-
Immune system approaches to intrusion detection - a review
-
Proceedings of the ICARIS-2004
-
U. Aickelin, J. Greensmith, and J. Twycross. Immune system approaches to intrusion detection - a review. In Proceedings of the ICARIS-2004, LNCS 3239, pages 316-329, 2004.
-
(2004)
LNCS
, vol.3239
, pp. 316-329
-
-
Aickelin, U.1
Greensmith, J.2
Twycross, J.3
-
4
-
-
26844541249
-
Anthocnet: An adaptive nature inspired algorithm for routing in mobile ad hoc networks
-
G. Di Caro, F. Ducatelle, and L.M. Gambardella. Anthocnet: An adaptive nature inspired algorithm for routing in mobile ad hoc networks. European Transactions on Telecommunications, 16(2):443-455, 2005.
-
(2005)
European Transactions on Telecommunications
, vol.16
, Issue.2
, pp. 443-455
-
-
Di Caro, G.1
Ducatelle, F.2
Gambardella, L.M.3
-
6
-
-
26944469543
-
Introducing dendritic cells as a novel immune-inspired algorithm for anomaly detection
-
Proceedings of the ICARIS-2005
-
J. Greensmith, U. Aickelin, and S. Cayzer. Introducing dendritic cells as a novel immune-inspired algorithm for anomaly detection. In Proceedings of the ICARIS-2005, LNCS 3627, pages 153-167, 2005.
-
(2005)
LNCS
, vol.3627
, pp. 153-167
-
-
Greensmith, J.1
Aickelin, U.2
Cayzer, S.3
-
8
-
-
17444426121
-
Ariadne: A secure on-demand routing protocol for ad hoc networks
-
Yih-Chun Hu, Adrian Perrig, and David B. Johnson. Ariadne: A secure on-demand routing protocol for ad hoc networks. Wireless Networks, 11(1-2):21-38, 2005.
-
(2005)
Wireless Networks
, vol.11
, Issue.1-2
, pp. 21-38
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.B.3
-
9
-
-
0000629443
-
Dynamic source routing in ad hoc wireless networks. In Imielinski and Korth, editors
-
David B Johnson and David A Maltz. Dynamic source routing in ad hoc wireless networks. In Imielinski and Korth, editors, Mobile Computing, pages 153-181. 1996.
-
(1996)
Mobile Computing
, pp. 153-181
-
-
Johnson, D.B.1
Maltz, D.A.2
-
10
-
-
0028201732
-
Tolerance, danger, and the extended family
-
P. Matzinger. Tolerance, danger, and the extended family. Annual Review of Immunology, 12:991-1045, 1994.
-
(1994)
Annual Review of Immunology
, vol.12
, pp. 991-1045
-
-
Matzinger, P.1
-
11
-
-
38149049152
-
Beeais: Artificial immune system security for nature inspired, manet routing protocol, beeadhoc
-
Proceedings of ICARIS-2007, Aug
-
N. Mazhar and M. Farooq. Beeais: Artificial immune system security for nature inspired, manet routing protocol, beeadhoc. In Proceedings of ICARIS-2007, LNCS 4628, pages 370-381, Aug, 2007.
-
(2007)
LNCS
, vol.4628
, pp. 370-381
-
-
Mazhar, N.1
Farooq, M.2
-
12
-
-
34548068359
-
Vulnerability analysis and security framework (beesec) for nature inspired manet routing protocols
-
July
-
N. Mazhar and M. Farooq. Vulnerability analysis and security framework (beesec) for nature inspired manet routing protocols. In Proceedings of GECCO-2007, pages 102-109, July, 2007.
-
(2007)
Proceedings of GECCO-2007
, pp. 102-109
-
-
Mazhar, N.1
Farooq, M.2
-
14
-
-
57349173460
-
-
Danger Project
-
Danger Project, http://www.dangertheory.com.
-
-
-
-
16
-
-
26844569805
-
-
S. Sarafijanovic and J.Y. Le Boudec. An artificial immune system approach with secondary response for misbehavior detection in mobile ad-hoc networks. IEEE Transactions on Neural Networks, 16(5), Sep 2005.
-
S. Sarafijanovic and J.Y. Le Boudec. An artificial immune system approach with secondary response for misbehavior detection in mobile ad-hoc networks. IEEE Transactions on Neural Networks, 16(5), Sep 2005.
-
-
-
-
17
-
-
32444432940
-
Beeadhoc: An energy efficient routing algorithm for mobile ad hoc networks inspired by bee behavior
-
H.F. Wedde, M. Farooq, T. Pannenbaecker, B. Vogel, C. Mueller, J. Meth, and R. Jeruschkat. Beeadhoc: an energy efficient routing algorithm for mobile ad hoc networks inspired by bee behavior. In GECCO, pages 153-160, 2005.
-
(2005)
GECCO
, pp. 153-160
-
-
Wedde, H.F.1
Farooq, M.2
Pannenbaecker, T.3
Vogel, B.4
Mueller, C.5
Meth, J.6
Jeruschkat, R.7
-
18
-
-
33750241323
-
Beehiveais: A simple, efficient, scalable and secure routing framework inspired by artificial immune systems
-
H.F. Wedde, C. Timm, and M. Farooq. Beehiveais: A simple, efficient, scalable and secure routing framework inspired by artificial immune systems. In PPSN, pages 623-632, 2006.
-
(2006)
PPSN
, pp. 623-632
-
-
Wedde, H.F.1
Timm, C.2
Farooq, M.3
|