暂无分享,去创建一个
Julie Greensmith | Uwe Aickelin | Jamie Twycross | U. Aickelin | J. Twycross | J. Greensmith | Julie Greensmith
[1] Uwe Aickelin,et al. Danger Theory: The Link between AIS and IDS? , 2003, ICARIS.
[2] Uwe Aickelin,et al. Towards a Conceptual Framework for Innate Immunity , 2005, ICARIS.
[3] Tim R Mosmann,et al. Dendritic cells: the immune information management experts , 2004, Nature Immunology.
[4] Uwe Aickelin,et al. libtissue - implementing innate immunity , 2006, 2006 IEEE International Conference on Evolutionary Computation.
[5] Uwe Aickelin,et al. Cooperative Automated Worm Response and Detection ImmuNe ALgorithm(CARDINAL) Inspired by T-Cell Immunity and Tolerance , 2005, ICARIS.
[6] Julie Greensmith,et al. Immune system approaches to intrusion detection – a review , 2004, Natural Computing.
[7] P. Matzinger. Tolerance, danger, and the extended family. , 1994, Annual review of immunology.
[8] Julie Greensmith,et al. Introducing Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomoly Detection , 2005, ICARIS.
[9] Julie Greensmith,et al. Articulation and Clarification of the Dendritic Cell Algorithm , 2006 .
[10] Julie Greensmith,et al. Two Ways to Grow Tissue for Artificial Immune Systems , 2005, ICARIS.
[11] Stephanie Forrest,et al. An immunological model of distributed detection and its application to computer security , 1999 .
[12] Julie Greensmith,et al. Dendritic Cells for Anomaly Detection , 2006, 2006 IEEE International Conference on Evolutionary Computation.