-
1
-
-
75149166684
-
An intrusion detection technique using co-co immune system for distributed data networks (CoCo-ISD)
-
MR Ahmedi D Maleki 2008 An intrusion detection technique using co-co immune system for distributed data networks (CoCo-ISD) IJCSNS Int J Comput Sci Netw Sec 8 4 160 169
-
(2008)
IJCSNS Int J Comput Sci Netw Sec
, vol.8
, Issue.4
, pp. 160-169
-
-
Ahmedi, M.R.1
Maleki, D.2
-
3
-
-
33751017631
-
Immune system approaches to intrusion detection-a review
-
Nicosia G et al (eds) Springer
-
Aickelin U, Greensmith J, Twycross J (2004) Immune system approaches to intrusion detection-a review. In: Nicosia G et al (eds) ICARIS 2004, LNCS 3239. Springer, pp 316-329
-
(2004)
ICARIS 2004, LNCS
, vol.3239
, pp. 316-329
-
-
Aickelin, U.1
Greensmith, J.2
Twycross, J.3
-
5
-
-
34548453089
-
An agent based and biological inspired real-time intrusion detection and security model for computer network operations
-
Elsevier
-
Boukerche A, Machado RB, Juca KRL, Sobral JBM, Notare MSMA (2007) An agent based and biological inspired real-time intrusion detection and security model for computer network operations. Comput Commun (30), 2649-2660, Elsevier
-
(2007)
Comput Commun
, vol.30
, pp. 2649-2660
-
-
Boukerche, A.1
MacHado, R.B.2
Juca, K.R.L.3
Sobral, J.B.M.4
Msma, N.5
-
6
-
-
84923280232
-
Application-level simulation for network security
-
March 03-07, 2008, France, Marseille
-
Bye R, Schmidt S, Luther K, Albayrak S (2008) Application-level simulation for network security. In: Proceedings of the 1st international conference on simulation tools and techniques for communications, networks and systems & workshops, March 03-07, 2008, France, Marseille
-
(2008)
Proceedings of the 1st International Conference on Simulation Tools and Techniques for Communications, Networks and Systems & Workshops
-
-
Bye, R.1
Schmidt, S.2
Luther, K.3
Albayrak, S.4
-
7
-
-
47749125439
-
Agent-based immunological intrusion detection system for mobile Ad-Hoc networks
-
Bubak M et al (eds) Springer
-
Byrski A, Carvalho M (2008) Agent-based immunological intrusion detection system for mobile Ad-Hoc networks. In: Bubak M et al (eds) ICCS 2008, Springer, pp 584-593
-
(2008)
ICCS 2008
, pp. 584-593
-
-
Byrski, A.1
Carvalho, M.2
-
8
-
-
1142282727
-
(How) Can mobile agents do secure electronic transactions on untrusted hosts? A survey of the security issues and the current solutions
-
10.1145/643477.643479
-
J Claessens B Preneel J Vandewalle 2003 (How) Can mobile agents do secure electronic transactions on untrusted hosts? A survey of the security issues and the current solutions ACM Trans Int Technol 3 1 28 48 10.1145/643477.643479
-
(2003)
ACM Trans Int Technol
, vol.3
, Issue.1
, pp. 28-48
-
-
Claessens, J.1
Preneel, B.2
Vandewalle, J.3
-
11
-
-
33749581519
-
Immunity and mobile agent based grid intrusion detection
-
Computational Intelligence and Bioinformatics International Conference on Intelligent Computing, ICIC 2006, Proceedings
-
Gong X, Li T, Liang G, Wang T, Yang J, Hu X (2006a) Immunity and mobile agent based grid intrusion detection. In: Huang D-S, Li K, Irwin GW (eds) Proceedings of ICIC 2006, LNBI 4115, Springer, pp 651-659 (Pubitemid 44532212)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, pp. 651-659
-
-
Gong, X.1
Li, T.2
Liang, G.3
Wang, T.4
Yang, J.5
Hu, X.6
-
12
-
-
33751358941
-
An immune mobile agent based grid intrusion detection model
-
Simulated Evolution and Learning - 6th International Conference, SEAL 2006, Proceedings
-
Gong X, Li T, Wang T, Yang J, Liu S, Liang G (2006b) An immune mobile agent based grid intrusion detection model. In: Wang T-D et al (eds) Proceedings of SEAL 2006, LNCS 4247, Springer, pp 112-119 (Pubitemid 44812328)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, pp. 112-119
-
-
Gong, X.1
Li, T.2
Wang, T.3
Yang, J.4
Liu, S.5
Liang, G.6
-
13
-
-
33750310998
-
Grid intrusion detection based on immune agent
-
Advances in Natural Computation - Second International Conference, ICNC 2006, Proceedings
-
Gong X, Li T, Wang T, Yang J, Liang G, Hu X (2006c) Grid intrusion detection based on immune agent. In: Jiao L et al (eds) Proceedings of ICNC 2006, Part II, LNCS 4222, Springer, pp 73-82 (Pubitemid 44618000)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, pp. 73-82
-
-
Gong, X.1
Li, T.2
Wang, T.3
Yang, J.4
Liang, G.5
Hu, X.6
-
14
-
-
77955898429
-
-
Robust intelligent systems, Springer, London
-
Greensmith J, Aickelin U, Cayzer S (2008) Detecting danger: the dendritic cell algorithm. Robust intelligent systems, Springer, London, pp 89-112
-
(2008)
Detecting danger: The dendritic cell algorithm
, pp. 89-112
-
-
Greensmith, J.1
Aickelin, U.2
Cayzer, S.3
-
16
-
-
78049441857
-
Next challenges in bringing artificial immune systems to production in network security
-
Budapest, Hungary, Arxiv preprint arXiv:0805.1786, 2008- arxiv.org
-
Hilker M (2008) Next challenges in bringing artificial immune systems to production in network security. In: Proceedings of BIONETICS, Budapest, Hungary, Arxiv preprint arXiv:0805.1786, 2008- arxiv.org
-
(2008)
Proceedings of BIONETICS
-
-
Hilker, M.1
-
18
-
-
44849134799
-
The next generation of immunity-based systems: From specific recognition to computational intelligence
-
Springer, Berlin
-
Ishida Y (2008) The next generation of immunity-based systems: from specific recognition to computational intelligence. Studies in computational intelligence (SCI), vol 115. Springer, Berlin, pp 1091-1121
-
(2008)
Studies in Computational Intelligence (SCI)
, vol.115
, pp. 1091-1121
-
-
Ishida, Y.1
-
19
-
-
35449005874
-
Immune system approaches to intrusion detection-a review
-
Springer, Berlin
-
Kim J, Bentley J P, Aickelin U, Greensmith J, Tedesco G, Twycross J (2007) Immune system approaches to intrusion detection-a review. Natural computing, vol 6. Springer, Berlin, pp 413-466
-
(2007)
Natural Computing
, vol.6
, pp. 413-466
-
-
Kim, J.1
Bentley, J.P.2
Aickelin, U.3
Greensmith, J.4
Tedesco, G.5
Twycross, J.6
-
21
-
-
33751362999
-
Immune multi-agent active defense model for network intrusion
-
Wang et al (eds) Springer
-
Liu S, Li T, Wang D, Zhao K, Gong X, Hu X, Xu C, Liang G (2006) Immune multi-agent active defense model for network intrusion. In: Wang et al (eds) SEAL 2006, LNCS 4247, Springer, pp 104-111
-
(2006)
SEAL 2006, LNCS
, vol.4247
, pp. 104-111
-
-
Liu, S.1
Li, T.2
Wang, D.3
Zhao, K.4
Gong, X.5
Hu, X.6
Xu, C.7
Liang, G.8
-
22
-
-
33947601959
-
Multi-agent network intrusion active defense model based on immune theory, Wuhan University
-
S Liu T Li D Wang X Hu C Xu 2007 Multi-agent network intrusion active defense model based on immune theory, Wuhan University J Nat Sci 12 1 167 171
-
(2007)
J Nat Sci
, vol.12
, Issue.1
, pp. 167-171
-
-
Liu, S.1
Li, T.2
Wang, D.3
Hu, X.4
Xu, C.5
-
23
-
-
38349068770
-
A cooperative AIS framework for intrusion detection
-
DOI 10.1109/ICC.2007.237, 4288908, 2007 IEEE International Conference on Communications, ICC'07
-
Luther K, Bye R, Alpcan T, Muller A, Albayrak S (2007) A cooperative AIS framework for intrusiondetection. In: Proceedings of the international conference on communications, Glasgow, pp 1409-1416, doi: 10.1109/ICC.2007.237 (Pubitemid 351145733)
-
(2007)
IEEE International Conference on Communications
, pp. 1409-1416
-
-
Luther, K.1
Bye, R.2
Alpcan, T.3
Muller, A.4
Albayrak, S.5
-
24
-
-
33746307335
-
A hybrid artificial immune and mobile agent intrusion detection based model for computer network operations
-
1530-2075/05
-
Machado RB, Boukerche A, Sobral JBM, Juca KRL, Notare Mirela SMA (2005) A hybrid artificial immune and mobile agent intrusion detection based model for computer network operations. In: Proceedings of the 19th IEEE international parallel and distributed processing symposium (IPDPS'05), 1530-2075/05
-
(2005)
Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05)
-
-
MacHado, R.B.1
Boukerche, A.2
Sobral, J.B.M.3
Juca, K.R.L.4
Notare Mirela, S.M.A.5
-
25
-
-
38049096241
-
Framework of an immunity-based anomaly detection system for user behavior
-
Apolloni B et al (eds)
-
Okamoto T, Ishida Y (2007) Framework of an immunity-based anomaly detection system for user behavior. In: Apolloni B et al (eds) KES 2007/ WIRN 2007, LNAI 4694, Springer, pp 821-829
-
(2007)
KES 2007/ WIRN 2007, LNAI 4694, Springer
, pp. 821-829
-
-
Okamoto, T.1
Ishida, Y.2
-
26
-
-
33745884161
-
Mutual tests using immunity-based diagnostic mobile agents in distributed intrusion detection systems
-
Watanabe Y, lshida Y (2004) Mutual tests using immunity-based diagnostic mobile agents in distributed intrusion detection systems. In: Proceedings of artificial life robotics (ISAROB, 2004), vol 8, pp 163-167
-
(2004)
Proceedings of Artificial Life Robotics (ISAROB, 2004)
, vol.8
, pp. 163-167
-
-
Watanabe, Y.1
Lshida, Y.2
-
27
-
-
51849128962
-
Computer security: A survey of methods and systems
-
10.3844/jcssp.2007.478.486
-
RV Yampolskiy V Govindaraju 2007 Computer security: a survey of methods and systems J Comput Sci 3 7 478 486 10.3844/jcssp.2007.478.486
-
(2007)
J Comput Sci
, vol.3
, Issue.7
, pp. 478-486
-
-
Yampolskiy, R.V.1
Govindaraju, V.2
-
28
-
-
59349106158
-
Distributed agents model for intrusion detection based on AIS
-
Elsevier
-
Yang J, Liu XJ, Li T, Liang G, Liu S (2009) Distributed agents model for intrusion detection based on AIS. Knowledge-based systems 22(2):115-119, Elsevier
-
(2009)
Knowledge-based Systems
, vol.22
, Issue.2
, pp. 115-119
-
-
Yang, J.1
Liu, X.J.2
Li, T.3
Liang, G.4
Liu, S.5
-
29
-
-
33646825370
-
An immune system inspired approach of collaborative intrusion detection system using mobile agents in wireless ad hoc networks
-
Hao Y et al (eds) Springer
-
Yeom K-W, Park J-H (2005) An immune system inspired approach of collaborative intrusion detection system using mobile agents in wireless ad hoc networks. In: Hao Y et al (eds) CIS 2005, Springer, pp 204-211
-
(2005)
CIS 2005
, pp. 204-211
-
-
Yeom, K.-W.1
Park, J.-H.2
-
30
-
-
33947317430
-
Artificial immune system inspired behavior-based anti-spam filter
-
Springer
-
Yue X, Abraham A, Chi Z-X, Hao Y-Y, Mo H (2006) Artificial immune system inspired behavior-based anti-spam filter. Soft Comput 11:729-740, Springer
-
(2006)
Soft Comput
, vol.11
, pp. 729-740
-
-
Yue, X.1
Abraham, A.2
Chi, Z.-X.3
Hao, Y.-Y.4
Mo, H.5
-
31
-
-
33847171030
-
Designing abstract immune mobile agents for distributed intrusion detection
-
ICNN&B '05, Beijing doi: 10.1109/ICNNB.2005.1614734
-
Zhang Z, Luo W, Wang X (2005) Designing abstract immune mobile agents for distributed intrusion detection. In: Proceedings of the international conference on neural networks and brain, ICNN&B '05, Beijing, (2):748-753. doi: 10.1109/ICNNB.2005.1614734
-
(2005)
Proceedings of the International Conference on Neural Networks and Brain
, Issue.2
, pp. 748-753
-
-
Zhang, Z.1
Luo, W.2
Wang, X.3
-
32
-
-
38049009397
-
The algorithm design of agent for detecting and analyzing data in intrusion detection based on immune principle
-
WiCom 2007, Shanghai
-
Zhongmin C, Yu W, Baowen X (2007) The algorithm design of agent for detecting and analyzing data in intrusion detection based on immune principle. In: Proceedings of the international conference on wireless communications, Networking and mobile computing. WiCom 2007, Shanghai, pp 1779-1783
-
(2007)
Proceedings of the International Conference on Wireless Communications, Networking and Mobile Computing
, pp. 1779-1783
-
-
Zhongmin, C.1
Yu, W.2
Baowen, X.3
|