메뉴 건너뛰기




Volumn , Issue , 2006, Pages 485-492

Artificial immune systems: Survey and applications in ad hoc wireless networks

Author keywords

Artificial immune system; Misbehavior detection; Wireless ad hoc network

Indexed keywords

AD HOC WIRELESS NETWORKS; ARTIFICIAL IMMUNE SYSTEM; BASIC MECHANISM; DOCUMENT REVIEW; HUMAN IMMUNE SYSTEMS; LEARNING PARADIGMS; MISBEHAVIOR DETECTION;

EID: 84870050607     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (15)

References (56)
  • 5
    • 0347742772 scopus 로고    scopus 로고
    • Intrusion detection systems and multisensor data fusion
    • Tim Baas. Intrusion detection systems and multisensor data fusion. Communications of the ACM, vol. 43, issue 4, pp. 99-105, 2000.
    • (2000) Communications of the ACM , vol.43 , Issue.4 , pp. 99-105
    • Baas, T.1
  • 14
  • 15
  • 16
    • 33751021639 scopus 로고    scopus 로고
    • The crossover closure and partial match detection
    • Fernando Esponda, Stephanie Forrest, Paul Helman. The Crossover Closure and Partial Match Detection. Proc. ICARIS 2003, pp. 249-260.
    • Proc. ICARIS 2003 , pp. 249-260
    • Esponda, F.1    Forrest, S.2    Helman, P.3
  • 17
    • 0002893043 scopus 로고    scopus 로고
    • Immunology as information processing
    • edited by L.A. Segel and I. Cohen. Santa Fe Institute Studies in the Sciences of Complexity. New York: Oxford University Press
    • S. Forrest and S.A. Hofmeyr. Immunology as information processing. In Design Principles for the Immune System and Other Distributed Autonomous Systems, edited by L.A. Segel and I. Cohen. Santa Fe Institute Studies in the Sciences of Complexity. New York: Oxford University Press (2001).
    • (2001) Design Principles for the Immune System and Other Distributed Autonomous Systems
    • Forrest, S.1    Hofmeyr, S.A.2
  • 18
    • 35248816526 scopus 로고    scopus 로고
    • A randomized real-valued negative selection algorithm
    • Fabio A. Gonzalez, Dipankar Dasgupta, Luis Fernando Nino. A Randomized Real-Valued Negative Selection Algorithm. Proc. ICARIS 2003, pp. 261-272.
    • Proc. ICARIS 2003 , pp. 261-272
    • Gonzalez, F.A.1    Dasgupta, D.2    Nino, L.F.3
  • 19
    • 0037003792 scopus 로고    scopus 로고
    • Denial of service attacks at the MAC layer in wireless ad hoc networks
    • V. Gupta, S. Krishnamurthy, and M. Faloutsos. Denial of Service Attacks at the MAC Layer in Wireless Ad Hoc Networks. Proc. of Milcom, 2002.
    • (2002) Proc. of Milcom
    • Gupta, V.1    Krishnamurthy, S.2    Faloutsos, M.3
  • 21
    • 26944466218 scopus 로고    scopus 로고
    • Not all balls are round: An investigation of alternative recognition-region shapes
    • Emma Hart. Not All Balls Are Round: An Investigation of Alternative Recognition-Region Shapes. Proc. ICARIS 2005, pp. 29-42.
    • Proc. ICARIS 2005 , pp. 29-42
    • Hart, E.1
  • 26
    • 0037936354 scopus 로고    scopus 로고
    • The transport layer: Tutorial and survey
    • Sami Iren, Paul D. Amer, Phillip, T. Conrad, The transport layer: tutorial and survey, ACM Computing Surveys, vol. 31, no. 4, pp. 360-404, 1999.
    • (1999) ACM Computing Surveys , vol.31 , Issue.4 , pp. 360-404
    • Iren, S.1    Amer, P.D.2    Conrad, P.T.3
  • 27
    • 4143141933 scopus 로고    scopus 로고
    • Stealth attacks on ad hoc wireless networks
    • M. Jakobsson and S. Wetzel and B. Yener. Stealth attacks on ad hoc wireless networks. Proc. VTC, 2003.
    • (2003) Proc. VTC
    • Jakobsson, M.1    Wetzel, S.2    Yener, B.3
  • 28
    • 0035912764 scopus 로고    scopus 로고
    • How the immune system works to protect the host from infection: A personal view
    • Jun 19
    • Charles A. Janeway Jr. How the immune system works to protect the host from infection: a personal view. Proc. Natl. Acad. Sci. USA., 2001 Jun 19;98(13):7461-8.
    • (2001) Proc. Natl. Acad. Sci. USA , vol.98 , Issue.13 , pp. 7461-7468
    • Janeway Jr., C.A.1
  • 29
    • 0000047098 scopus 로고
    • Towards a network theory of the immune system
    • N.K. Jerne. Towards a network theory of the immune system. Annuals of Immunology, 1974.
    • (1974) Annuals of Immunology
    • Jerne, N.K.1
  • 31
    • 0000629443 scopus 로고    scopus 로고
    • Dynamic source routing in ad hoc wireless networks
    • Tomasz Imielinski and Hank Korth, Eds. Chapter 5 Kluwer Academic Publishers
    • D. Johnson and D. Maltz. Dynamic Source Routing in Ad Hoc Wireless Networks. Mobile Computing, Tomasz Imielinski and Hank Korth, Eds. Chapter 5, pages 153-181, Kluwer Academic Publishers, 1996.
    • (1996) Mobile Computing , pp. 153-181
    • Johnson, D.1    Maltz, D.2
  • 32
    • 84861587712 scopus 로고    scopus 로고
    • Client puzzles: A cryptographic countermeasure against connection depletion attacks
    • February
    • A. Juels and J. Brainard. Client puzzles: A cryptographic countermeasure against connection depletion attacks. In Distributed Systems Security (SNDSS), pages 151-165, February 1999.
    • (1999) Distributed Systems Security (SNDSS) , pp. 151-165
    • Juels, A.1    Brainard, J.2
  • 34
    • 0038458266 scopus 로고    scopus 로고
    • Evaluating negative selection in an artificial immune system for network intrusion detection
    • San Francisco July 7-11
    • Kim, J. and Bentley, P. J. Evaluating Negative Selection in an Artificial Immune System for Network Intrusion Detection, Proc. Genetic and Evolutionary Computation Conference 2001 (GECCO-2001), San Francisco, pp.1330-1337, July 7-11, 2001.
    • (2001) Proc. Genetic and Evolutionary Computation Conference 2001 (GECCO-2001) , pp. 1330-1337
    • Kim, J.1    Bentley, P.J.2
  • 35
    • 1542298520 scopus 로고    scopus 로고
    • Detection and handling of mac layer misbehavior in wireless networks
    • UIUC, August
    • P. Kyasanur and N. H. Vaidya. Detection and handling of mac layer misbehavior in wireless networks. Technical report, CSL, UIUC, August 2002.
    • (2002) Technical Report, CSL
    • Kyasanur, P.1    Vaidya, N.H.2
  • 36
    • 0033489670 scopus 로고    scopus 로고
    • Survivability - A new technical and business perspective on security
    • Association for Computer Machinery
    • Howard F. Lipson and David A. Fisher. Survivability - A New Technical and Business Perspective on Security. Proc. 1999 New Security Paradigms Workshop, Association for Computer Machinery, 2000.
    • (2000) Proc. 1999 New Security Paradigms Workshop
    • Lipson, H.F.1    Fisher, D.A.2
  • 38
    • 0028430224 scopus 로고
    • Network intrusion detection
    • May/June
    • Biswanath L. Mukherjee, Todd Heberlein, and Karl N. Levitt, Network Intrusion Detection. IEEE Network, vol. 8 no. 3, pp. 26-41, May/June 1994.
    • (1994) IEEE Network , vol.8 , Issue.3 , pp. 26-41
    • Mukherjee, B.L.1    Heberlein, T.2    Levitt, K.N.3
  • 39
    • 0038282217 scopus 로고    scopus 로고
    • Modern intrusion detection, data mining, and degrees of attack guilt
    • D. Barbarà and S. Jajodia (eds.), Kluwer Academic Publisher
    • Steven Noel, Duminda Wijesekera, Charles Youman. Modern Intrusion Detection, Data Mining, and Degrees of Attack Guilt. In Applications of Data Mining in Computer Security, D. Barbarà and S. Jajodia (eds.), Kluwer Academic Publisher, 2002.
    • (2002) Applications of Data Mining in Computer Security
    • Noel, S.1    Wijesekera, D.2    Youman, C.3
  • 40
    • 2342630172 scopus 로고    scopus 로고
    • Secure traceroute to detect faulty or malicious routing
    • Venkata N. Padmanabhan, Daniel R. Simon. Secure traceroute to detect faulty or malicious routing. ACM SIGCOMM Computer Communication Review, vol. 33, issue 1, pp. 77-82, 2003.
    • (2003) ACM SIGCOMM Computer Communication Review , vol.33 , Issue.1 , pp. 77-82
    • Padmanabhan, V.N.1    Simon, D.R.2
  • 42
  • 46
    • 26844458123 scopus 로고    scopus 로고
    • An artificial immune system for misbehavior detection in mobile ad-hoc networks with virtual thymus, clustering, danger signal and memory detectors
    • Slavisa Sarafijanović and Jean-Yves Le Boudec. An Artificial Immune System for Misbehavior Detection in Mobile Ad-Hoc Networks with Virtual Thymus, Clustering, Danger Signal and Memory Detectors. Proc. ICARIS (Third international conference on artificial immune systems), 2004.
    • (2004) Proc. ICARIS (Third International Conference on Artificial Immune Systems)
    • Sarafijanović, S.1    Le Boudec, J.-Y.2
  • 48
    • 0001831930 scopus 로고    scopus 로고
    • The resurrecting duckling: Security issues for ad-hoc wireless networks. Security protocols
    • Frank Stajano, Ross Anderson. The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks. Security Protocols, Proc. 7th International Workshop, 1999.
    • (1999) Proc. 7th International Workshop
    • Stajano, F.1    Anderson, R.2
  • 53
    • 84947551624 scopus 로고    scopus 로고
    • CDIS: Towards a computer immune system for detecting network intrusions
    • LNCS 2212 Jan
    • Paul D. Williams, Kevin P. Anchor, John L. Bebo, Gregg H. Gunsch, Gary D. Lamont. CDIS: Towards a Computer Immune System for Detecting Network Intrusions. Proc. RAID 2001, LNCS 2212, pp. 117-133, Jan 2001.
    • (2001) Proc. RAID 2001 , pp. 117-133
    • Williams, P.D.1    Anchor, K.P.2    Bebo, J.L.3    Gunsch, G.H.4    Lamont, G.D.5
  • 55
    • 0041473688 scopus 로고    scopus 로고
    • Intrusion detection techniques for mobile wireless networks
    • September
    • Yongguang Zhang, Wenke Lee, and Yian Huang. Intrusion Detection Techniques for Mobile Wireless Networks, ACM/Kluwer Wireless Networks Journal (ACM W1NET), vol. 9, No. 5 (September 2003).
    • (2003) ACM/Kluwer Wireless Networks Journal (ACM W1NET) , vol.9 , Issue.5
    • Zhang, Y.1    Lee, W.2    Yian, H.3
  • 56
    • 0033357103 scopus 로고    scopus 로고
    • Securing ad hoc networks
    • Lidong Zhou and Zygmunt J. Haas. Securing Ad Hoc Networks. IEEE Network, vol. 13, number 6, pp. 24-30, 1999.
    • (1999) IEEE Network , vol.13 , Issue.6 , pp. 24-30
    • Zhou, L.1    Haas, Z.J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.