-
1
-
-
0027961889
-
Self-nonself discrimination in a computer
-
IEEE Computer Society Press
-
Forrest, S., Perelson, A.S., Allen, L., Cherukuri, R.: Self-nonself discrimination in a computer. In: Proceedings of the IEEE Symposium on Research in Security and Privacy, pp. 202-212. IEEE Computer Society Press (1994)
-
(1994)
Proceedings of the IEEE Symposium on Research in Security and Privacy
, pp. 202-212
-
-
Forrest, S.1
Perelson, A.S.2
Allen, L.3
Cherukuri, R.4
-
2
-
-
0031258214
-
Computer immunology
-
Forrest, S., Hofmeyr, S.A., Somayaji, A.: Computer immunology. Communications of the ACM 40, 88-96 (1997)
-
(1997)
Communications of the ACM
, vol.40
, pp. 88-96
-
-
Forrest, S.1
Hofmeyr, S.A.2
Somayaji, A.3
-
3
-
-
0038458266
-
An evaluation of negative selection in an artificial immune system for network intrusion detection
-
Morgan Kaufmann
-
Kim, J., Bentley, P.J.: An evaluation of negative selection in an artificial immune system for network intrusion detection. In: Proceedings of the Genetic and Evolutionary Computation Conference (GECCO), pp. 1330-1337. Morgan Kaufmann (2001)
-
(2001)
Proceedings of the Genetic and Evolutionary Computation Conference (GECCO)
, pp. 1330-1337
-
-
Kim, J.1
Bentley, P.J.2
-
4
-
-
0029718285
-
An immunological approach to change detection: Algorithms, analysis, and implications
-
IEEE Computer Society
-
D'haeseleer, P., Forrest, S., Helman, P.: An immunological approach to change detection: Algorithms, analysis, and implications. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 110-119. IEEE Computer Society (1996)
-
(1996)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 110-119
-
-
D'Haeseleer, P.1
Forrest, S.2
Helman, P.3
-
5
-
-
47949126201
-
Theoretical advances in artificial immune systems
-
Timmis, J., Hone, A., Stibor, T., Clark, E.: Theoretical advances in artificial immune systems. Theoretical Computer Science 403, 11-32 (2008)
-
(2008)
Theoretical Computer Science
, vol.403
, pp. 11-32
-
-
Timmis, J.1
Hone, A.2
Stibor, T.3
Clark, E.4
-
6
-
-
0032313923
-
Intrusion detection using sequences of system calls
-
Hofmeyr, S.A., Forrest, S., Somayaji, A.: Intrusion detection using sequences of system calls. Journal of Computer Security 6, 151-180 (1998)
-
(1998)
Journal of Computer Security
, vol.6
, pp. 151-180
-
-
Hofmeyr, S.A.1
Forrest, S.2
Somayaji, A.3
-
7
-
-
3543128182
-
Coverage and generalization in an artificial immune system
-
Balthrop, J., Esponda, F., Forrest, S., Glickman, M.R.: Coverage and generalization in an artificial immune system. In: Proceedings of the 2002 Genetic and Evolutionary Computation Conference (GECCO 2002), pp. 1045-1050 (2002)
-
(2002)
Proceedings of the 2002 Genetic and Evolutionary Computation Conference (GECCO 2002)
, pp. 1045-1050
-
-
Balthrop, J.1
Esponda, F.2
Forrest, S.3
Glickman, M.R.4
-
9
-
-
51049121627
-
An Empirical Study of Self/Non-self Discrimination in Binary Data with a Kernel Estimator
-
Bentley, P.J., Lee, D., Jung, S. (eds.) ICARIS 2008. Springer, Heidelberg
-
Stibor, T.: An Empirical Study of Self/Non-self Discrimination in Binary Data with a Kernel Estimator. In: Bentley, P.J., Lee, D., Jung, S. (eds.) ICARIS 2008. LNCS, vol. 5132, pp. 352-363. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5132
, pp. 352-363
-
-
Stibor, T.1
-
10
-
-
70350342307
-
Efficient Algorithms for String-Based Negative Selection
-
Andrews, P.S., Timmis, J., Owens, N.D.L., Aickelin, U., Hart, E., Hone, A., Tyrrell, A.M. (eds.) ICARIS 2009. Springer, Heidelberg
-
Elberfeld, M., Textor, J.: Efficient Algorithms for String-Based Negative Selection. In: Andrews, P.S., Timmis, J., Owens, N.D.L., Aickelin, U., Hart, E., Hone, A., Tyrrell, A.M. (eds.) ICARIS 2009. LNCS, vol. 5666, pp. 109-121. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5666
, pp. 109-121
-
-
Elberfeld, M.1
Textor, J.2
-
11
-
-
78651312881
-
Negative selection algorithms on strings with efficient training and linear-time classification
-
Elberfeld, M., Textor, J.: Negative selection algorithms on strings with efficient training and linear-time classification. Theoretical Computer Science 412, 534-542 (2011)
-
(2011)
Theoretical Computer Science
, vol.412
, pp. 534-542
-
-
Elberfeld, M.1
Textor, J.2
-
12
-
-
34547258581
-
The link between r-contiguous detectors and k-CNF satisfiability
-
IEEE Press
-
Stibor, T., Timmis, J., Eckert, C.: The link between r-contiguous detectors and k-CNF satisfiability. In: Proceedings of the Congress on Evolutionary Computation (CEC), pp. 491-498. IEEE Press (2006)
-
(2006)
Proceedings of the Congress on Evolutionary Computation (CEC)
, pp. 491-498
-
-
Stibor, T.1
Timmis, J.2
Eckert, C.3
-
13
-
-
67049142361
-
A comparative evaluation of anomaly detection techniques for sequence data
-
Chandola, V., Mithal, V., Kumar, V.: A comparative evaluation of anomaly detection techniques for sequence data. In: Proceedings of the 2008 Eighth IEEE International Conference on Data Mining (ICDM 2008), pp. 743-748 (2008)
-
(2008)
Proceedings of the 2008 Eighth IEEE International Conference on Data Mining (ICDM 2008)
, pp. 743-748
-
-
Chandola, V.1
Mithal, V.2
Kumar, V.3
-
14
-
-
0030130884
-
Network constraints and multi-objective optimization for one-class classification
-
Moya, M.M., Hush, D.R.: Network constraints and multi-objective optimization for one-class classification. Neural Networks 9(3), 463-474 (1996)
-
(1996)
Neural Networks
, vol.9
, Issue.3
, pp. 463-474
-
-
Moya, M.M.1
Hush, D.R.2
-
15
-
-
68049121093
-
Anomaly detection: A survey
-
Chandola, V., Banerjee, A., Kumar, V.: Anomaly detection: A survey. ACM Computing Surveys 41(3), 1-58 (2009)
-
(2009)
ACM Computing Surveys
, vol.41
, Issue.3
, pp. 1-58
-
-
Chandola, V.1
Banerjee, A.2
Kumar, V.3
-
18
-
-
0032639421
-
Detecting intrusions using system calls: Alternative data models
-
IEEE Computer Society
-
Warrender, C., Forrest, S., Pearlmutter, B.: Detecting intrusions using system calls: Alternative data models. In: IEEE Symposium on Security and Privacy, pp. 133-145. IEEE Computer Society (1999)
-
(1999)
IEEE Symposium on Security and Privacy
, pp. 133-145
-
-
Warrender, C.1
Forrest, S.2
Pearlmutter, B.3
-
22
-
-
0033976458
-
The PFAM protein families database
-
Bateman, A., Birney, E., Durbin, R., Eddy, S.R., Howe, K.L., Sonnhammer, E.L.: The PFAM protein families database. Nucleic Acids Research 28, 263-266 (2000)
-
(2000)
Nucleic Acids Research
, vol.28
, pp. 263-266
-
-
Bateman, A.1
Birney, E.2
Durbin, R.3
Eddy, S.R.4
Howe, K.L.5
Sonnhammer, E.L.6
-
23
-
-
0029716418
-
A sense of self for unix processes
-
IEEE Computer Society, Washington, DC
-
Forrest, S., Hofmeyr, S.A., Somayaji, A., Longstaff, T.A.: A sense of self for unix processes. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 120-128. IEEE Computer Society, Washington, DC (1996)
-
(1996)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 120-128
-
-
Forrest, S.1
Hofmeyr, S.A.2
Somayaji, A.3
Longstaff, T.A.4
-
24
-
-
84962260018
-
Evaluating intrusion detection systems - The 1998 DARPA offline intrusion detection evaluation
-
IEEE Computer Society Press
-
Lippmann, R.P., et al.: Evaluating intrusion detection systems - the 1998 DARPA offline intrusion detection evaluation. In: DARPA Information Survivability Conference and Exposition (DISCEX) 2000, vol. 2, pp. 12-26. IEEE Computer Society Press (2000)
-
(2000)
DARPA Information Survivability Conference and Exposition (DISCEX) 2000
, vol.2
, pp. 12-26
-
-
Lippmann, R.P.1
|