-
1
-
-
35248825128
-
Danger theory: The link between a1s and ids, artificial immune systems
-
U. Aickelin, P. Bentl ey, S. Cayzer, J. Kim and J. McLeod, Danger Theory: The Link between A1S and IDS, Artificial Immune Systems, Lecture Notes in Computer Science, Vol 2787/2003, pp 147-155, 2003
-
(2003)
Lecture Notes in Computer Science
, vol.2787
, Issue.2003
, pp. 147-155
-
-
Aickelin, U.1
Bentley, P.2
Cayzer, S.3
Kim, J.4
McLeod, J.5
-
4
-
-
34547275785
-
Network security on the intrusion detection system level, tnes '06
-
Liberios Vokorokos, Alzbeta Kelinova, Ondrej Latka, Network Security on the Intrusion Detection System Level, TNES '06. Proceedings, International Conference on Intelligent Engineering Systems, pp 270-275, 2006.
-
(2006)
Proceedings, International Conference on Intelligent Engineering Systems
, pp. 270-275
-
-
Vokorokos, L.1
Kelinova, A.2
Latka, O.3
-
7
-
-
68349158957
-
Information fusion in the immune system
-
Jamie Twycross, Uwe Aickelin, Information Fusion in the Immune System, Elsevier, Information Fusion, Vol. 11 , Issue I, pp 35-44, 2010.
-
(2010)
Elsevier Information Fusion
, vol.11
, Issue.1
, pp. 35-44
-
-
Twycross, J.1
Aickelin, U.2
-
9
-
-
77954598748
-
Detecting anomalous process behaviour using second generation artificial immune systems
-
Jamie Twycross, Uwe Aickelin, Amanda Whitbrook, Detecting Anomalous Process Behaviour using Second Generation Artificial Immune Systems, International Journal of Unconventional Computing, pp. 301-326, 2010
-
(2010)
International Journal of Unconventional Computing
, pp. 301-326
-
-
Twycross, J.1
Aickelin, U.2
Whitbrook, A.3
-
10
-
-
51749118738
-
And evolution induced secondary immunity: An artificial immune system based intrusion detection system
-
Divyataa Dal, Siby Abraham, Ajith Abraham, Sugata Sanyal, Mukund Sanglikar, and Evolution Induced Secondary Immunity: An Artificial Immune System based Intrusion Detection System, CISIM '08. 7th Computer Information Systems and Industrial Management Applications, P. 65-70, 2008.
-
(2008)
CISIM '08. 7th Computer Information Systems and Industrial Management Applications
, pp. 65-70
-
-
Dal, D.1
Abraham, S.2
Abraham, A.3
Sanyal, S.4
Sanglikar, M.5
-
11
-
-
85015670078
-
Investigating the evolution and stability of a resource limited artificial immune system
-
Timmis, J. & Neal, M. Investigating the evolution and stability of a Resource Limited Artificial Immune System. Special Workshop on Artificial
-
Special Workshop on Artificial
-
-
Timmis, J.1
Neal, M.2
-
12
-
-
85015702815
-
-
Workshop Program, Las Vegas, Nevada, U.S.A
-
[mmune Systems, Gentic and Evolutionary Computtion Conference (GECCO), Workshop Program, Las Vegas, Nevada, U.S.A, pp 40-41 , 2000
-
(2000)
[Mmune Systems, Gentic and Evolutionary Computtion Conference (GECCO)
, pp. 40-41
-
-
-
14
-
-
33750219901
-
-
University of Kent at Canterbury
-
S.T. Wierzchon, U. Kuzelewska, Stable clusters formation in an artificial immune system, 1st International Conference on Artificial Immune Systems, ICARIS'02, University of Kent at Canterbury, pp. 68-75, 2002.
-
(2002)
Stable Clusters Formation in An Artificial Immune System, 1st International Conference on Artificial Immune Systems, ICARIS'02
, pp. 68-75
-
-
Wierzchon, S.T.1
Kuzelewska, U.2
-
15
-
-
58049196508
-
A new clustering algorithm based on artificial immune system
-
Tao Liu, Yan Zhou, Zhifeng Hu, Zhijie Wang, A New Clustering Algorithm Based on Artificial Immune System, FSKD '08. Fifth International Conference on Fuzzy Systems and Knowledge Discovery, Vol. 2, pp 347-351, 2008.
-
(2008)
FSKD '08. Fifth International Conference on Fuzzy Systems and Knowledge Discovery
, vol.2
, pp. 347-351
-
-
Liu, T.1
Zhou, Y.2
Hu, Z.3
Wang, Z.4
-
16
-
-
77958021504
-
-
March
-
Xianjin Fang, Longshu Li, An improved artificial immune approach to network intrusion detection, 2nd International Conference on Advanced Computer Control (lCACC), Vol. 2 , pp. 39-44, March 2010.
-
(2010)
An Improved Artificial Immune Approach to Network Intrusion Detection, 2nd International Conference on Advanced Computer Control (LCACC)
, vol.2
, pp. 39-44
-
-
Fang, X.1
Li, L.2
-
17
-
-
77953883563
-
Intrusion detection using data mining techniques (camp)
-
M. Ektefa, S. Memar, F. Sidi, L.S. Affendey, Intrusion detection using data mining techniques, (CAMP), International Conference on Information Retrieval & Knowledge Management, pp. 200, 2010.
-
(2010)
International Conference on Information Retrieval & Knowledge Management
, pp. 200
-
-
Ektefa, M.1
Memar, S.2
Sidi, F.3
Affendey, L.S.4
-
18
-
-
84867465490
-
An active rule approach for network intrusion detection with enhanced c4.5 algorithm
-
L Prema Rajeswari, Kannan Arputharaj, An Active rule approach for Network Intrusion Detection with Enhanced C4.5 algorithm, Int'l I. 1. of Communications, Network and System Sciences, Vol. 4, pp. 285-385, 2008.
-
(2008)
Int L I. 1. of Communications, Network and System Sciences
, vol.4
, pp. 285-385
-
-
Prema Rajeswari, L.1
Arputharaj, K.2
-
19
-
-
77950575061
-
Ghorbani, a detailed analysis of the kdd cup 99 data set
-
P.I
-
M. Tavallaee, E. Bagheri, Wei Lu, Ali A. Ghorbani, A detailed analysis of the KDD CUP 99 data set, IEEE Symposium on Computational Intelligence for Security and Defense Applications, CISDA 2009, P.I , http://nsl.cs.unb.calNSL-KDD/, 2009.
-
(2009)
IEEE Symposium on Computational Intelligence for Security and Defense Applications, CISDA
, vol.2009
-
-
Tavallaee, M.1
Bagheri, E.2
Lu, W.3
Ali, A.4
|