-
1
-
-
0031258214
-
-
(October 1997)
-
Forrest, S., Hofmeyer, S.A., and Somayaji, A.: Computer Immunology. Communication of the ACM, Vol. 40, No. 10, (October 1997) 88-96
-
Computer Immunology. Communication of the ACM
, vol.40
, Issue.10
, pp. 88-96
-
-
Forrest, S.1
Hofmeyer, S.A.2
Somayaji, A.3
-
2
-
-
84957039800
-
-
Langdale, Cumbria, UK
-
Somayaji, A., Hofmeyr, S., and Forrest, S.: Principles of a Computer Immune System. 1997 New Security Paradigms Workshop, Langdale, Cumbria, UK (1997) 75-82
-
(1997)
Principles of a Computer Immune System. 1997 New Security Paradigms Workshop
, pp. 75-82
-
-
Somayaji, A.1
Hofmeyr, S.2
Forrest, S.3
-
4
-
-
84955580290
-
An Architecture for Intrusion Detection using Autonomous Agents
-
Phoenix, Arizona. (December 7-11
-
Balasubramaniyan, J., Garcia-Fernandez, J., Isakoff, D., Spafford, E., and Zamboni, D.: An Architecture for Intrusion Detection using Autonomous Agents. In Proceedings of the 14th Annual Computer Security Applications Conference, Phoenix, Arizona. (December 7-11, 1998)
-
(1998)
Proceedings of the 14Th Annual Computer Security Applications Conference
-
-
Balasubramaniyan, J.1
Garcia-Fernandez, J.2
Isakoff, D.3
Spafford, E.4
Zamboni, D.5
-
5
-
-
0003536924
-
-
3rd Edition. W.H. Freeman and Co., New York
-
Kuby, J.: Immunology. 3rd Edition. W.H. Freeman and Co., New York (1997)
-
(1997)
Immunology
-
-
Kuby, J.1
-
6
-
-
0003732734
-
-
Garland Publishing, New York
-
Janeway, C.A., Travers, P., Walport, W., and Capra, J.D.: Immunobiology. The immune system in health and disease. Garland Publishing, New York (1999)
-
(1999)
Immunobiology. The Immune System in Health and Disease
-
-
Janeway, C.A.1
Travers, P.2
Walport, W.3
Capra, J.D.4
-
7
-
-
85172423269
-
Jam: Java agents for meta-learning over distributed databases
-
Newport Beach, CA
-
Stolfo, S.J., Prodromidis, A.L., Tselepis, S., Lee, W., Fan, D.W., and Chan, P.K.: Jam: Java agents for meta-learning over distributed databases. In Proceedings of the 3rd International Conference on Knowledge Discovery and Data Mining, Newport Beach, CA, (1997) 74-8 1
-
(1997)
Proceedings of the 3Rd International Conference on Knowledge Discovery and Data Mining
, vol.1
, pp. 74-78
-
-
Stolfo, S.J.1
Prodromidis, A.L.2
Tselepis, S.3
Lee, W.4
Fan, D.W.5
Chan, P.K.6
-
8
-
-
0029756282
-
Cooperating Security Managers: A Peer-Based Intrusion Detection System
-
(January/February
-
White, G., Fish, E., and Pooch, U.: Cooperating Security Managers: A Peer-Based Intrusion Detection System. IEEE Network (January/February 1996) 20-23
-
(1996)
IEEE Network
, pp. 20-23
-
-
White, G.1
Fish, E.2
Pooch, U.3
-
9
-
-
0002675748
-
Intrusion Detection for Distributed Applications
-
July 99
-
Stillman, M., Marceau, C., and Stillman, M.: Intrusion Detection for Distributed Applications. Communications of the ACM, Vol. 42, No. 7, (July 99) 63-69
-
Communications of the ACM
, vol.42
, Issue.7
, pp. 63-69
-
-
Stillman, M.1
Marceau, C.2
Stillman, M.3
-
10
-
-
84880174811
-
Detecting Intrusions Using System Calls: Alternative Data Models
-
Warrender, C., Forrest, S., and Pearlmutter, B.: Detecting Intrusions Using System Calls: Alternative Data Models. IEEE Symp. on Security and Privacy, (1999) 133-145
-
(1999)
IEEE Symp. On Security and Privacy
, pp. 133-145
-
-
Warrender, C.1
Forrest, S.2
Pearlmutter, B.3
|