Cyber Immunity - A Bio-Inspired Cyber Defense System

[1]  Jeffrey Soar,et al.  Multimedia data mining using deep learning , 2015, 2015 Fifth International Conference on Digital Information Processing and Communications (ICDIPC).

[2]  Hajar Mousannif,et al.  Data quality in internet of things: A state-of-the-art survey , 2016, J. Netw. Comput. Appl..

[3]  Prasant Mohapatra,et al.  Dynamic defense strategy against advanced persistent threat with insiders , 2015, 2015 IEEE Conference on Computer Communications (INFOCOM).

[4]  Sherali Zeadally,et al.  Bio-inspired cybersecurity for wireless sensor networks , 2016, IEEE Communications Magazine.

[5]  Alan S. Perelson,et al.  The immune system, adaptation, and machine learning , 1986 .

[6]  Sumeet Dua,et al.  Data Mining and Machine Learning in Cybersecurity , 2011 .

[7]  Kalyan Veeramachaneni,et al.  AI^2: Training a Big Data Machine to Defend , 2016, 2016 IEEE 2nd International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing (HPSC), and IEEE International Conference on Intelligent Data and Security (IDS).

[8]  Erhan Guven,et al.  A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection , 2016, IEEE Communications Surveys & Tutorials.

[9]  David J. Musliner,et al.  FUZZBUSTER: Towards Adaptive Immunity from Cyber Threats , 2011, 2011 Fifth IEEE Conference on Self-Adaptive and Self-Organizing Systems Workshops.

[10]  Ralph Langner,et al.  Stuxnet: Dissecting a Cyberwarfare Weapon , 2011, IEEE Security & Privacy.

[11]  Haris M. Khalid,et al.  A Bayesian Algorithm to Enhance the Resilience of WAMS Applications Against Cyber Attacks , 2016, IEEE Transactions on Smart Grid.

[12]  Camelia-Mihaela Pintea,et al.  Bio-inspired Computing , 2014 .