1 |
Negative selection: how to generate detectors
/
[
M. Ayara;J. Timmis;R. de Lemos;L. de Castro;R. Duncan
] /
Proc. of 1st International Conference on Artificial Immune System
|
2 |
An agent based architecture for a computer virus immune system
/
[
P. Harmer;G. Lamont
] /
Proc. of the Genetic and Evolutionary Computation Conference (GECCO 2000) Workshop Program
|
3 |
Intrusion detection using sequences of system calls
/
[
S. Hofmeyr; S. Forrest;A. Somayaji
] /
Journal of Computer Security
|
4 |
Detecting intrusions using system calls: Alternative data models
/
[
C. Warrender;S. Forrest;B. Pearlmutter
] /
Proc. of the IEEE Symposium on security and Privacy
|
5 |
An immune agent architecture for intrusion detection
/
[
D. Dasgupta
] /
Proc. of the Genetic and Evolutionary Computation Conference (GECCO2000) Workshop Program
|
6 |
An immunity-based security layer model
/
[
J. Gu;D. Lee;S. Park;K. Sim
] /
Proc. of the Genetic and Evolutionary Computation Conference (GECCO 2000) Workshop Program
|
7 |
An antibody layer for internet security
/
[
J. Gu;D. Lee;K. Sim;S. Park
] /
Proc. of the Global Telecommunication Conference (GLOBECOM 2000)
|
8 |
Self-nonself discrimination in a computer
/
[
S. Forrest;A.S. Perelson;L. Allen;R. Cherukuri
] /
Proc. of the IEEE Symposium on Research in Security and Privacy
|
9 |
/
[
I. Roitt;J. Brostoff;D. Male
] /
Immunology
|
10 |
/
[
R. A. Wallace;G. P. Sanders;R. J. Ferl
] /
Biology: The science of life
|
11 |
Anomaly detection using negative selection based on the r-contiguous matching rule
/
[
S. Singh
] /
Proc. of 1st International Conference on Artificial Immune System
|
12 |
An anomaly detection algorithm inspired by the immune system
/
[
D. Dasgupta;S. Forrest
] /
Artificial Immune Systems and Their Applications
|
13 |
An immunity-based security layer against Internet antigens
/
[
J. Gu;D. Lee;K. Sim;S. Park
] /
Trans. on IEICE
|
14 |
Principles of a computer immune system
/
[
A. Somayaji;S. Hofmeyr;S. Forrest
] /
Proc. of the New Security Paradigms Workshop
|
15 |
Computer immunology
/
[
S. Forrest;S. Hofmeyr;A. Somayaji
] /
Communications of the ACM
DOI
ScienceOn
|
16 |
An immunological approach to change detection: algorithms, analysis, and implications
/
[
P. D'haeseleer;S. Forrest;P. Helman
] /
Proc. of the IEEE Symposium on Computer Security and Privacy
|