Analogies with immunology represent an important step toward the vision of robust, distributed protection for computers.
暂无分享,去创建一个
Stephanie Forrest | Steven A. Hofmeyr | Anil Somayaji | S. Forrest | S. Hofmeyr | Anil Somayaji | ComputImmu distributed protection for computers. | Anil Somayaji
[1] Dorothy E. Denning,et al. An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.
[2] William Hugh Murray,et al. The application of epidemiology to computer viruses , 1988, Comput. Secur..
[3] A. Kohn. [Computer viruses]. , 1989, Harefuah.
[4] Eugene H. Spafford,et al. Computer Viruses--A Form of Artificial Life? , 1990 .
[5] Karl N. Levitt,et al. Automated detection of vulnerabilities in privileged programs by execution monitoring , 1994, Tenth Annual Computer Security Applications Conference.
[6] Alan S. Perelson,et al. Self-nonself discrimination in a computer , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.
[7] P. Norman,et al. Immunobiology: The immune system in health and disease , 1995 .
[8] Jeffrey O. Kephart,et al. Biologically Inspired Defenses Against Computer Viruses , 1995, IJCAI.
[9] Paul Helman,et al. An immunological approach to change detection: algorithms, analysis and implications , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[10] C. Janeway. Immunobiology: The Immune System in Health and Disease , 1996 .
[11] Stephanie Forrest,et al. A sense of self for Unix processes , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.