-
3
-
-
4344609431
-
Danger theory: The link between ais and ids
-
Edinburgh, UK
-
U. Aickelin, P. Bentley, S. Cayzer, J. Kim, and J. McLeod. Danger theory: The link between ais and ids. Proc. International Conference on Artificial Immune Systems (ICARIS'03), pages 156-167, Edinburgh, UK, 2003.
-
(2003)
Proc. International Conference on Artificial Immune Systems (ICARIS'03)
, pp. 156-167
-
-
Aickelin, U.1
Bentley, P.2
Cayzer, S.3
Kim, J.4
McLeod, J.5
-
5
-
-
0347742772
-
Intrusion detection systems and multisensor data fusion
-
Tim Baas. Intrusion detection systems and multisensor data fusion. Communications of the ACM, vol. 43, issue 4, pp. 99-105, 2000.
-
(2000)
Communications of the ACM
, vol.43
, Issue.4
, pp. 99-105
-
-
Baas, T.1
-
7
-
-
33747294522
-
Understanding protocol performance and robustness of ad hoc networks through structural analysis
-
C. L. Barrett, M. Drozda, D. C. Engelhart, V. S. Anil Kumar, M. V. Marathe, M. M. Morin, S. S. Ravi, and J. P. Smith. Understanding Protocol Performance and Robustness of Ad Hoc Networks Through Structural Analysis. Proc. IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob 2005).
-
Proc. IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob 2005)
-
-
Barrett, C.L.1
Drozda, M.2
Engelhart, D.C.3
Anil Kumar, V.S.4
Marathe, M.V.5
Morin, M.M.6
Ravi, S.S.7
Smith, J.P.8
-
11
-
-
0029718285
-
An immunological approach to change detection: Algorithms, analysis and implications
-
D'haeseleer, P., Forrest, S., and Helman, P. An immunological approach to change detection: Algorithms, analysis and implications. Proc. IEEE Symposium on Research in Security and Privacy, 1996.
-
(1996)
Proc. IEEE Symposium on Research in Security and Privacy
-
-
D'haeseleer, P.1
Forrest, S.2
Helman, P.3
-
14
-
-
84966620150
-
Testing and evaluating computer intrusion detection systems
-
Robert Durst, Terrence Champion, Brian Witten, Eric Miller, Luigi Spagnuolo. Testing and evaluating computer intrusion detection systems. Communications of the ACM, vol. 42, issue 7, pp. 53-61, 1999.
-
(1999)
Communications of the ACM
, vol.42
, Issue.7
, pp. 53-61
-
-
Durst, R.1
Champion, T.2
Witten, B.3
Miller, E.4
Spagnuolo, L.5
-
15
-
-
0742324903
-
A formal framework for positive and negative detection
-
Esponda, F., Forrest, S. and Helman, P. A formal framework for positive and negative detection, IEEE Trans. Syst., Man Cybernet., vol. 34, pp. 357-373, 2004.
-
(2004)
IEEE Trans. Syst., Man Cybernet.
, vol.34
, pp. 357-373
-
-
Esponda, F.1
Forrest, S.2
Helman, P.3
-
16
-
-
33751021639
-
The crossover closure and partial match detection
-
Fernando Esponda, Stephanie Forrest, Paul Helman. The Crossover Closure and Partial Match Detection. Proc. ICARIS 2003, pp. 249-260.
-
Proc. ICARIS 2003
, pp. 249-260
-
-
Esponda, F.1
Forrest, S.2
Helman, P.3
-
17
-
-
0002893043
-
Immunology as information processing
-
edited by L.A. Segel and I. Cohen. Santa Fe Institute Studies in the Sciences of Complexity. New York: Oxford University Press
-
S. Forrest and S.A. Hofmeyr. Immunology as information processing. In Design Principles for the Immune System and Other Distributed Autonomous Systems, edited by L.A. Segel and I. Cohen. Santa Fe Institute Studies in the Sciences of Complexity. New York: Oxford University Press (2001).
-
(2001)
Design Principles for the Immune System and Other Distributed Autonomous Systems
-
-
Forrest, S.1
Hofmeyr, S.A.2
-
18
-
-
35248816526
-
A randomized real-valued negative selection algorithm
-
Fabio A. Gonzalez, Dipankar Dasgupta, Luis Fernando Nino. A Randomized Real-Valued Negative Selection Algorithm. Proc. ICARIS 2003, pp. 261-272.
-
Proc. ICARIS 2003
, pp. 261-272
-
-
Gonzalez, F.A.1
Dasgupta, D.2
Nino, L.F.3
-
19
-
-
0037003792
-
Denial of service attacks at the MAC layer in wireless ad hoc networks
-
V. Gupta, S. Krishnamurthy, and M. Faloutsos. Denial of Service Attacks at the MAC Layer in Wireless Ad Hoc Networks. Proc. of Milcom, 2002.
-
(2002)
Proc. of Milcom
-
-
Gupta, V.1
Krishnamurthy, S.2
Faloutsos, M.3
-
20
-
-
0036613003
-
An artificial immune system architecture for computer security applications
-
June
-
P. Harmer, P. Williams, G. H. Gnusch, and G. Lamont. An Artificial Immune System Architecture for Computer Security Applications. IEEE Transactions on Evolutionary Computation, 6(3):252-280, June 2002.
-
(2002)
IEEE Transactions on Evolutionary Computation
, vol.6
, Issue.3
, pp. 252-280
-
-
Harmer, P.1
Williams, P.2
Gnusch, G.H.3
Lamont, G.4
-
21
-
-
26944466218
-
Not all balls are round: An investigation of alternative recognition-region shapes
-
Emma Hart. Not All Balls Are Round: An Investigation of Alternative Recognition-Region Shapes. Proc. ICARIS 2005, pp. 29-42.
-
Proc. ICARIS 2005
, pp. 29-42
-
-
Hart, E.1
-
26
-
-
0037936354
-
The transport layer: Tutorial and survey
-
Sami Iren, Paul D. Amer, Phillip, T. Conrad, The transport layer: tutorial and survey, ACM Computing Surveys, vol. 31, no. 4, pp. 360-404, 1999.
-
(1999)
ACM Computing Surveys
, vol.31
, Issue.4
, pp. 360-404
-
-
Iren, S.1
Amer, P.D.2
Conrad, P.T.3
-
28
-
-
0035912764
-
How the immune system works to protect the host from infection: A personal view
-
Jun 19
-
Charles A. Janeway Jr. How the immune system works to protect the host from infection: a personal view. Proc. Natl. Acad. Sci. USA., 2001 Jun 19;98(13):7461-8.
-
(2001)
Proc. Natl. Acad. Sci. USA
, vol.98
, Issue.13
, pp. 7461-7468
-
-
Janeway Jr., C.A.1
-
29
-
-
0000047098
-
Towards a network theory of the immune system
-
N.K. Jerne. Towards a network theory of the immune system. Annuals of Immunology, 1974.
-
(1974)
Annuals of Immunology
-
-
Jerne, N.K.1
-
31
-
-
0000629443
-
Dynamic source routing in ad hoc wireless networks
-
Tomasz Imielinski and Hank Korth, Eds. Chapter 5 Kluwer Academic Publishers
-
D. Johnson and D. Maltz. Dynamic Source Routing in Ad Hoc Wireless Networks. Mobile Computing, Tomasz Imielinski and Hank Korth, Eds. Chapter 5, pages 153-181, Kluwer Academic Publishers, 1996.
-
(1996)
Mobile Computing
, pp. 153-181
-
-
Johnson, D.1
Maltz, D.2
-
32
-
-
84861587712
-
Client puzzles: A cryptographic countermeasure against connection depletion attacks
-
February
-
A. Juels and J. Brainard. Client puzzles: A cryptographic countermeasure against connection depletion attacks. In Distributed Systems Security (SNDSS), pages 151-165, February 1999.
-
(1999)
Distributed Systems Security (SNDSS)
, pp. 151-165
-
-
Juels, A.1
Brainard, J.2
-
34
-
-
0038458266
-
Evaluating negative selection in an artificial immune system for network intrusion detection
-
San Francisco July 7-11
-
Kim, J. and Bentley, P. J. Evaluating Negative Selection in an Artificial Immune System for Network Intrusion Detection, Proc. Genetic and Evolutionary Computation Conference 2001 (GECCO-2001), San Francisco, pp.1330-1337, July 7-11, 2001.
-
(2001)
Proc. Genetic and Evolutionary Computation Conference 2001 (GECCO-2001)
, pp. 1330-1337
-
-
Kim, J.1
Bentley, P.J.2
-
35
-
-
1542298520
-
Detection and handling of mac layer misbehavior in wireless networks
-
UIUC, August
-
P. Kyasanur and N. H. Vaidya. Detection and handling of mac layer misbehavior in wireless networks. Technical report, CSL, UIUC, August 2002.
-
(2002)
Technical Report, CSL
-
-
Kyasanur, P.1
Vaidya, N.H.2
-
36
-
-
0033489670
-
Survivability - A new technical and business perspective on security
-
Association for Computer Machinery
-
Howard F. Lipson and David A. Fisher. Survivability - A New Technical and Business Perspective on Security. Proc. 1999 New Security Paradigms Workshop, Association for Computer Machinery, 2000.
-
(2000)
Proc. 1999 New Security Paradigms Workshop
-
-
Lipson, H.F.1
Fisher, D.A.2
-
38
-
-
0028430224
-
Network intrusion detection
-
May/June
-
Biswanath L. Mukherjee, Todd Heberlein, and Karl N. Levitt, Network Intrusion Detection. IEEE Network, vol. 8 no. 3, pp. 26-41, May/June 1994.
-
(1994)
IEEE Network
, vol.8
, Issue.3
, pp. 26-41
-
-
Mukherjee, B.L.1
Heberlein, T.2
Levitt, K.N.3
-
39
-
-
0038282217
-
Modern intrusion detection, data mining, and degrees of attack guilt
-
D. Barbarà and S. Jajodia (eds.), Kluwer Academic Publisher
-
Steven Noel, Duminda Wijesekera, Charles Youman. Modern Intrusion Detection, Data Mining, and Degrees of Attack Guilt. In Applications of Data Mining in Computer Security, D. Barbarà and S. Jajodia (eds.), Kluwer Academic Publisher, 2002.
-
(2002)
Applications of Data Mining in Computer Security
-
-
Noel, S.1
Wijesekera, D.2
Youman, C.3
-
40
-
-
2342630172
-
Secure traceroute to detect faulty or malicious routing
-
Venkata N. Padmanabhan, Daniel R. Simon. Secure traceroute to detect faulty or malicious routing. ACM SIGCOMM Computer Communication Review, vol. 33, issue 1, pp. 77-82, 2003.
-
(2003)
ACM SIGCOMM Computer Communication Review
, vol.33
, Issue.1
, pp. 77-82
-
-
Padmanabhan, V.N.1
Simon, D.R.2
-
42
-
-
4243082091
-
Security in wireless sensor networks
-
Adrian Perrig, John Stankovic, David Wagner. Security in wireless sensor networks. Communications of the ACM, vol. 47, issue 6, pp. 53-57, 2004.
-
(2004)
Communications of the ACM
, vol.47
, Issue.6
, pp. 53-57
-
-
Perrig, A.1
Stankovic, J.2
Wagner, D.3
-
44
-
-
0002098559
-
TCP congestion control with a misbehaving receiver
-
Stefan Savage, Neal Cardwell and David Wetherall and Tom Anderson. TCP Congestion Control with a Misbehaving Receiver. Computer Communication Review, vol. 29, number 5, 1999.
-
(1999)
Computer Communication Review
, vol.29
, Issue.5
-
-
Savage, S.1
Cardwell, N.2
Wetherall, D.3
Anderson, T.4
-
45
-
-
0035361712
-
Network support for IP traceback
-
Stefan Savage, David Wetherall, Anna Karlin, Tom Anderson. Network support for IP traceback. IEEE/ACM Transactions on Networking, vol. 9, issue 3, pp. 226-237, 2001.
-
(2001)
IEEE/ACM Transactions on Networking
, vol.9
, Issue.3
, pp. 226-237
-
-
Savage, S.1
Wetherall, D.2
Karlin, A.3
Anderson, T.4
-
46
-
-
26844458123
-
An artificial immune system for misbehavior detection in mobile ad-hoc networks with virtual thymus, clustering, danger signal and memory detectors
-
Slavisa Sarafijanović and Jean-Yves Le Boudec. An Artificial Immune System for Misbehavior Detection in Mobile Ad-Hoc Networks with Virtual Thymus, Clustering, Danger Signal and Memory Detectors. Proc. ICARIS (Third international conference on artificial immune systems), 2004.
-
(2004)
Proc. ICARIS (Third International Conference on Artificial Immune Systems)
-
-
Sarafijanović, S.1
Le Boudec, J.-Y.2
-
48
-
-
0001831930
-
The resurrecting duckling: Security issues for ad-hoc wireless networks. Security protocols
-
Frank Stajano, Ross Anderson. The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks. Security Protocols, Proc. 7th International Workshop, 1999.
-
(1999)
Proc. 7th International Workshop
-
-
Stajano, F.1
Anderson, R.2
-
49
-
-
0036986445
-
Survivable mobile wireless networks: Issues, challenges, and research directions
-
James P. G. Sterbenz, Rajesh Krishnan, Regina Rosales Hain, Alden W Jackson, David Levin, Ram Ramanathan, John Zao. Survivable mobile wireless networks: issues, challenges, and research directions. Proc. ACM workshop on Wireless security, 2002.
-
(2002)
Proc. ACM Workshop on Wireless Security
-
-
James, P.1
Sterbenz, G.2
Krishnan, R.3
Hain, R.R.4
Jackson, A.W.5
Levin, D.6
Ramanathan, R.7
Zao, J.8
-
53
-
-
84947551624
-
CDIS: Towards a computer immune system for detecting network intrusions
-
LNCS 2212 Jan
-
Paul D. Williams, Kevin P. Anchor, John L. Bebo, Gregg H. Gunsch, Gary D. Lamont. CDIS: Towards a Computer Immune System for Detecting Network Intrusions. Proc. RAID 2001, LNCS 2212, pp. 117-133, Jan 2001.
-
(2001)
Proc. RAID 2001
, pp. 117-133
-
-
Williams, P.D.1
Anchor, K.P.2
Bebo, J.L.3
Gunsch, G.H.4
Lamont, G.D.5
-
55
-
-
0041473688
-
Intrusion detection techniques for mobile wireless networks
-
September
-
Yongguang Zhang, Wenke Lee, and Yian Huang. Intrusion Detection Techniques for Mobile Wireless Networks, ACM/Kluwer Wireless Networks Journal (ACM W1NET), vol. 9, No. 5 (September 2003).
-
(2003)
ACM/Kluwer Wireless Networks Journal (ACM W1NET)
, vol.9
, Issue.5
-
-
Zhang, Y.1
Lee, W.2
Yian, H.3
-
56
-
-
0033357103
-
Securing ad hoc networks
-
Lidong Zhou and Zygmunt J. Haas. Securing Ad Hoc Networks. IEEE Network, vol. 13, number 6, pp. 24-30, 1999.
-
(1999)
IEEE Network
, vol.13
, Issue.6
, pp. 24-30
-
-
Zhou, L.1
Haas, Z.J.2
|