메뉴 건너뛰기




Volumn , Issue , 2009, Pages 181-189

Artificial dendritic cells algorithm for online break-in fraud detection

Author keywords

[No Author keywords available]

Indexed keywords

ANTIGEN RECEPTORS; ARTIFICIAL IMMUNE SYSTEM; COMPUTER SECURITY; DENDRITIC CELLS; DENTRITIC CELLS; FALSE ALARMS; FRAUD DETECTION; HIGH DETECTION RATE; HIGH DIMENSIONAL DATA; ONLINE VIDEO;

EID: 77949574827     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/DeSE.2009.59     Document Type: Conference Paper
Times cited : (11)

References (19)
  • 2
    • 0015956495 scopus 로고
    • Towards a network theory of the immune system
    • Jerne, N. (1974) "Towards a network theory of the immune system," Annals of Immunology, vol. 125, pp. 373-389)
    • (1974) Annals of Immunology , vol.125 , pp. 373-389
    • Jerne, N.1
  • 3
    • 77949584002 scopus 로고    scopus 로고
    • de Castro, L. N. and F. J. Von Zuben. (2000) The clonal selection algorithm with engineering applications. In Proc. of GECCO 00. Workshop on Artificial Immune Systems and Their Applications. Pages 36-37
    • de Castro, L. N. and F. J. Von Zuben. (2000) "The clonal selection algorithm with engineering applications". In Proc. of GECCO" 00. Workshop on Artificial Immune Systems and Their Applications. Pages 36-37
  • 4
    • 0028201732 scopus 로고
    • Tolerance, danger and the extended family
    • P. Matzinger., (1994), Tolerance, danger and the extended family. Annual Reviews in Immunology, 12:991-1045.
    • (1994) Annual Reviews in Immunology , vol.12 , pp. 991-1045
    • Matzinger, P.1
  • 5
    • 0037066427 scopus 로고    scopus 로고
    • The Danger Model: A Renewed Sense of Self
    • P. Matzinger, (2002), "The Danger Model: A Renewed Sense of Self, Science, 296, pp. 301-305.
    • (2002) Science , vol.296 , pp. 301-305
    • Matzinger, P.1
  • 6
    • 26944469543 scopus 로고    scopus 로고
    • Introducing Dendritic Cells as a Novel Immune-Inspired Algorithm for Intrusion Detection
    • Springer-Verlag, pp
    • Greensmith, J., Aickelin, U. and Cayzer, S. (2005) Introducing Dendritic Cells as a Novel Immune-Inspired Algorithm for Intrusion Detection, In Proc. of ICARIS-05, Springer-Verlag, pp. 153-167.
    • (2005) Proc. of ICARIS-05 , pp. 153-167
    • Greensmith, J.1    Aickelin, U.2    Cayzer, S.3
  • 7
    • 35248825128 scopus 로고    scopus 로고
    • U. Aickelin, P. Bentley, S. Cayzer, J. Kim, and J. (2003) McLeod. Danger theory: The link between AIS and IDS. In Proc. of the 2nd International Conference on Artificial Immune Systems (ICARIS), LNCS 2787, pp. 147-155. Springer-Verlag.
    • U. Aickelin, P. Bentley, S. Cayzer, J. Kim, and J. (2003) McLeod. Danger theory: The link between AIS and IDS. In Proc. of the 2nd International Conference on Artificial Immune Systems (ICARIS), LNCS 2787, pp. 147-155. Springer-Verlag.
  • 8
    • 77949597341 scopus 로고    scopus 로고
    • The DCA SOMe comparison: A comparative study between two biologically-inspired algorithms. Evolutionary Intelligence: Special Issue on Artificial Immune Systems
    • accepted for publication
    • J. Greensmith, U. Aickelin, and J. Feyereisl. (2008) The DCA SOMe comparison: A comparative study between two biologically-inspired algorithms. Evolutionary Intelligence: Special Issue on Artificial Immune Systems, accepted for publication.
    • (2008)
    • Greensmith, J.1    Aickelin, U.2    Feyereisl, J.3
  • 12
    • 33751021110 scopus 로고    scopus 로고
    • Danger Is Ubiquitous: Detecting Malicous Activities in Sensor Networks Using the Dendritic Cell Algorithm, ICARIS
    • Jungwon Kim, Peter Bentley, and Christian Wallenta, (2006), "Danger Is Ubiquitous: Detecting Malicous Activities in Sensor Networks Using the Dendritic Cell Algorithm", ICARIS, LNCS 4163, pp. 390-403.
    • (2006) LNCS , vol.4163 , pp. 390-403
    • Kim, J.1    Bentley, P.2    Wallenta, C.3
  • 13
    • 72149127416 scopus 로고    scopus 로고
    • Improving the reliability of real time embedded systems using innate immune techniques
    • Special Issue on Artificial Immune Systems
    • N. Lay and I. Bate. (2008)Improving the reliability of real time embedded systems using innate immune techniques. Evolutionary Intelligence: Special Issue on Artificial Immune Systems.
    • (2008) Evolutionary Intelligence
    • Lay, N.1    Bate, I.2
  • 14
    • 38349072232 scopus 로고    scopus 로고
    • The application of a dendritic cell algorithm to a robotic classifier
    • Proc. of the 6th International Conference on Artificial Immune Systems ICARIS
    • R. Oates, J. Greensmith, U. Aickelin, J. Garibaldi, and G. Kendall. (2007), The application of a dendritic cell algorithm to a robotic classifier. In Proc. of the 6th International Conference on Artificial Immune Systems (ICARIS), LNCS 4628,pp.204-215.
    • (2007) LNCS , vol.4628 , pp. 204-215
    • Oates, R.1    Greensmith, J.2    Aickelin, U.3    Garibaldi, J.4    Kendall, G.5
  • 18
    • 77949647465 scopus 로고    scopus 로고
    • Emilie Lundin, Hakan Kvarnstr om and Erland Jonsson. A synthetic fraud data generation methodology. (2002), In Proceedings of the Fourth International Conference on Information and Communications Security (ICICS 2002), Singapore, December 9-12, 2002. 2513 of Lecture Notes in Computer Science, Springer-Verlag.
    • Emilie Lundin, Hakan Kvarnstr "om and Erland Jonsson. A synthetic fraud data generation methodology. (2002), In Proceedings of the Fourth International Conference on Information and Communications Security (ICICS 2002), Singapore, December 9-12, 2002. Volume 2513 of Lecture Notes in Computer Science, Springer-Verlag.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.