Multiagent-Based Dendritic Cell Algorithm with Applications in Computer Security
暂无分享,去创建一个
[1] Julie Greensmith,et al. The DCA: SOMe comparison , 2008, Evol. Intell..
[2] Na Wang,et al. Multi-agents Artificial Immune System (MAAIS) Inspired by Danger Theory for Anomaly Detection , 2007, 2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007).
[3] Julie Greensmith,et al. Information fusion for anomaly detection with the dendritic cell algorithm , 2010, Inf. Fusion.
[4] Julie Greensmith,et al. An Agent Based Classification Model , 2009, ArXiv.
[5] Gregg H. Gunsch,et al. An artificial immune system architecture for computer security applications , 2002, IEEE Trans. Evol. Comput..
[6] P. Matzinger. Tolerance, danger, and the extended family. , 1994, Annual review of immunology.
[7] Stephanie Forrest,et al. A sense of self for Unix processes , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[8] Uwe Aickelin,et al. Danger Theory: The Link between AIS and IDS? , 2003, ICARIS.
[9] Julie Greensmith,et al. Detecting Danger: The Dendritic Cell Algorithm , 2010, ArXiv.
[10] Yiwen Liang,et al. Integrating Innate and Adaptive Immunity for Worm Detection , 2009, 2009 Second International Workshop on Knowledge Discovery and Data Mining.
[11] Tao Li,et al. Distributed agents model for intrusion detection based on AIS , 2009, Knowl. Based Syst..