A Layered Multi-Agent Detection Model for Abnormal Intrusion Based on Danger Theory
暂无分享,去创建一个
[1] Song Yuan. The Cloud Scheduler Politics of Multiprocessor Multitask Real Time Systems , 2000 .
[2] P. Matzinger. Tolerance, danger, and the extended family. , 1994, Annual review of immunology.
[3] Mohd Aizaini Maarof,et al. Towards Danger Theory Based Artificial APC Model: Novel Metaphor for Danger Susceptible Data Codons , 2004, ICARIS.
[4] Alan S. Perelson,et al. Self-nonself discrimination in a computer , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.
[5] Dipankar Dasgupta,et al. Immunity-Based Intrusion Detection System: A General Framework , 1999 .
[6] Zhang Jian-hua. The Research for an Improved Dynamic Clonal Selection Algorithm Applied to Intrusion Detection , 2006 .
[7] Michael Garland,et al. Hierarchical face clustering on polygonal surfaces , 2001, I3D '01.
[8] Uwe Aickelin,et al. Danger Theory: The Link between AIS and IDS? , 2003, ICARIS.
[9] Uwe Aickelin,et al. The Danger Theory and Its Application to Artificial Immune Systems , 2008, ArXiv.