1 |
J. Kim and P. J. Bentley, "Negative Selection and Niching by an Artificial Immune System for Network Intrusion Detection," A late-breaking paper, pp.149-158, Genetic and Evolutionary Computation Conference (GECCO '99), Orlando, Florida, July 13-17, 1999.
|
2 |
R. A. Wallace, G. P. Sanders, and R. J. Ferl, BIOLOGY: The Science of Life, 3rd eds., Harper Collins Publishers Inc., 1991.
|
3 |
I. Roitt, J. Brostoff, D. Male, Immunology, 4th edition, Mosby, 1996.
|
4 |
심귀보, 양재원, 이동욱, 서동일, 최양서, “학습알고리즘 기반의 적응형 침입탐지 알고리즘,” 한국퍼지 및 지능시스템 학회 논문지, 14권, 1호, pp. 75-81, 2004, 2.
과학기술학회마을
DOI
ScienceOn
|
5 |
D. Dasgupta ed, Artificial Immune Systems and Their Applications, Springer-Verlag, 1998.
|
6 |
L. N. de Castro and J. Timmis, Artificial Immune System: A New Computational Intelligence Approach, Springer, 2002.
|
7 |
S. Forrest, A.S. Perelson, L. Allen, and R. Cherukuri “Self-nonself discrimination in a computer,” Proc. of 1994 IEEE Symposium on Research in Security and Privacy, pp. 202-212, 1994.
|
8 |
P. D'haeseleer, “A distributed approach to anomaly detection,” ACM Transactions on Information System Security, 1997.
|
9 |
J. Kim, P.J. Bently, “Evaluating negative selection in artificial immune system for network intrusion detection,” Proc. of the Genetic and Evolutionary Computation Conference, pp. 1330-1337, 2001.
|
10 |
J. Kim, and P. J. Bentley, “Towards an artificial immune system for network intrusion detection: An investigation of clonal selection with a negative selection operator,” Proc. of Congress on Evolutionary Computation, pp.1244-1252, 2001.
|
11 |
S. A. Hofmeyr, A. Somayaji, and S. Forrest. “Intrusion detection using sequences of system calls,” Journal of Computer Security, vol. 6, pp 151-180, 1998.
|
12 |
심귀보, 양재원, 이동욱, 서동일, 최양서, “생체 면역계를 이용한 네트워크 침입탐지 시스템,” 한국퍼지 및 지능시스템학회 논문지, 12권, 5호, pp.411-416, 2002. 10.
과학기술학회마을
DOI
ScienceOn
|
13 |
이동욱, 심귀보, “T세포 발생과정의 긍정 및 부정 선택에 기반한 변경 검사 알고리즘,” 한국퍼지 및 지능시스템학회 논문지, 13권, 1호, pp. 119-124, 2003. 2.
과학기술학회마을
DOI
ScienceOn
|
14 |
D. Dasgupta, “Information processing in immune system,” in D. Corne, M. Dorigo, and F. Glover (Eds.), New ideas in optimization, pp. 161-166. McGraw-Hill
|
15 |
B. Caswell, J. Beale, J. C. Foster, and J. Posluns, Snort 2.0 Intrusion Detection, Syngress, pp.28-36. 2003.
|
16 |
M. Roesch. et al, Snort Users Manual Snort Release: 2.0.0, 8th, 2003.
|
17 |
D. E. Goldberg, Genetic Algorithms in Search, Optimization, and Machine Learning, pp. 189-192, Addison Wesley, 1989.
|
18 |
심귀보, 서동일, 김대수, 임기욱, “컴퓨터 면역시스템 개발을 위한 인공면역계의 모델링과 자기인식 알고리즘,” 한국퍼지 및 지능시스템학회 논문지, 12권, 1호, pp. 52-60, 2002. 2.
과학기술학회마을
|
19 |
J. B. Gu, D. W. Lee, K. B. Sim, and S. H. Park, “An immunity-based security layer against Internet antigens,” IEICE Trans. on Communications, vol. E83-B, no. 11, pp. 2570-2575, 2000.
|