Immune Mobile Agent and Its Application in Intrusion Detection System
暂无分享,去创建一个
[1] W. Hunteman. Automated Information System (AIS) Alarm System , 1997 .
[2] B. Noble,et al. On certain integrals of Lipschitz-Hankel type involving products of bessel functions , 1955, Philosophical Transactions of the Royal Society of London. Series A, Mathematical and Physical Sciences.
[3] Stephanie Forrest,et al. Intrusion Detection Using Sequences of System Calls , 1998, J. Comput. Secur..
[4] Julie Greensmith,et al. Immune system approaches to intrusion detection – a review , 2004, Natural Computing.
[5] Stephanie Forrest,et al. A Machine Learning Evaluation of an Artificial Immune System , 2005, Evolutionary Computation.
[6] Anneli Folkesson. Computer networks 3 , 2013 .
[7] Peter G. Neumann,et al. EMERALD: Event Monitoring Enabling Responses to Anomalous Live Disturbances , 1997, CCS 2002.
[8] M. A. Maarof,et al. Feature Selection Using Rough Set in Intrusion Detection , 2006, TENCON 2006 - 2006 IEEE Region 10 Conference.
[9] Eugene H. Spafford,et al. Intrusion detection using autonomous agents , 2000, Comput. Networks.
[10] Byung-Joo Kim,et al. Kernel based intrusion detection system , 2005, Fourth Annual ACIS International Conference on Computer and Information Science (ICIS'05).
[11] Hu Mingzeng,et al. A novel distributed intrusion detection model based on mobile agent , 2004, InfoSecu '04.
[12] Peter J. Bentley,et al. Towards an artificial immune system for network intrusion detection: an investigation of dynamic clonal selection , 2002, Proceedings of the 2002 Congress on Evolutionary Computation. CEC'02 (Cat. No.02TH8600).
[13] Julie Greensmith,et al. Immune System Approaches to Intrusion Detection - A Review , 2004, ICARIS.