메뉴 건너뛰기




Volumn 2001-January, Issue , 2001, Pages 138-143

Design of security system based on immune system

Author keywords

Communication system security; Computer networks; Computer security; Immune system; Information analysis; Information security; Intrusion detection; IP networks; Logic programming; Protection

Indexed keywords

COMPUTATIONAL LINGUISTICS; COMPUTER NETWORKS; COMPUTER PROGRAMMING; COMPUTER SYSTEMS PROGRAMMING; IMMUNE SYSTEM; INFORMATION ANALYSIS; INTRUSION DETECTION; LOGIC PROGRAMMING; MERCURY (METAL); SECURITY OF DATA; SECURITY SYSTEMS;

EID: 84950266250     PISSN: 15244547     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ENABL.2001.953403     Document Type: Conference Paper
Times cited : (7)

References (9)
  • 1
    • 0012297627 scopus 로고    scopus 로고
    • Computer intrusion detection based on Bay es Factors for comparing command transition probabilities
    • W. DuMouchel, Computer intrusion detection based on Bay es Factors for comparing command transition probabilities, National Institut e of Statistical Sciences Technical Report, 1999.
    • (1999) National Institute of Statistical Sciences Technical Report
    • DuMouchel, W.1
  • 3
    • 0002467033 scopus 로고    scopus 로고
    • Architecture for an artificial immune system
    • S. A. Hofmeyr and S. Forrest, Architecture for an artificial immune system, Evolutionary Computation, 7(1), pp. 45-68, 2000.
    • (2000) Evolutionary Computation , vol.7 , Issue.1 , pp. 45-68
    • Hofmeyr, S.A.1    Forrest, S.2
  • 4
    • 77949731575 scopus 로고    scopus 로고
    • Temporal Sequence Learning and Data Reduction for Anomaly Detection
    • T. Lane and C. E. Brodley, Temporal Sequence Learning and Data Reduction for Anomaly Detection, ACM Transactions on Information and System Security, 2(3), pp.295-331, 1999.
    • (1999) ACM Transactions on Information and System Security , vol.2 , Issue.3 , pp. 295-331
    • Lane, T.1    Brodley, C.E.2
  • 9
    • 35248826951 scopus 로고    scopus 로고
    • The Study and Implementation for Tracing Intruder by Mobile Agent, and Intrusion Detection using Marks
    • A. Taguchi, et al, The Study and Implementation for Tracing Intruder by Mobile Agent, and Intrusion Detection using Marks, Proc. of the 1999 Synposium on Cryptography and Information Security,pp.627-632, 1999.
    • (1999) Proc. of the 1999 Synposium on Cryptography and Information Security , pp. 627-632
    • Taguchi, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.