1 |
Y. Yu and J. Graham, "Threat Evaluation for Intrusion Detection based upon Fuzzy Number Theory," Proc. of the Symposium on Information Assurance: Intrusion Detection and Prevention, pp.81-87, June 2006.
|
2 |
S. J. Chen and S. M. Chen, "A new simple center-of-gravity method for handling the fuzzy ranking and the defuzzification problems," Proc. of the 8th National Conference Fuzzy Theory Application, pp.103-110, 2000.
|
3 |
Dasgupta D., "Advances in Artificial Immune System," IEEE Computational Intelligence Magazine, Vol.1, pp.40-49, Nov. 2006.
DOI
|
4 |
M. S. Abadeh, J. Habibi, M. Daneshi, M. Jalali and M. Khezrzadeh, "Intrusion Detection using a Hybridization of Evolutionary Fuzzy Systems and Artificial immune Systems," Proc. of CEC 2007, pp.3547-3553, Sept. 2007.
|
5 |
Li Zhi-tang, Li Yao and Wang Li, "A Novel Fuzzy Anomaly Detection Algorithm based on Artificial Immune System," Proc. of HPCASIA '05, pp.5-9, Nov. 2005.
|
6 |
H. Groux, N. Fournier, and F. Cottrez, "Role of Dendritic cells in the generation of regulatory T cells", Seminars in Immunology, Vol.16, No.2, pp.99-106, 2004.
DOI
ScienceOn
|
7 |
Aickelin. U and Cayzer. S, "The Danger Theory and Its Application to Artificial Immune Systems," Proc. of ICAARIS2002, pp.141-148, 2002.
|
8 |
Zhen Yu Zhou, JianJing Shen, and XinPeng Zhang, "A Danger Theory Inspired Multi-agent Fusion Model for Network Security Assessment," Proc. of the ICC2007, Vol.3, pp.599-603, Aug. 2007.
|
9 |
S. Forrest, A. perelson, L. Allen, and R. Cherukuri, "Self-nonself discrimination in a computer," Proc. of the IEEE Symposium on Research in Security and Privacy, pp.202-212, 1994.
|