Extending the Computer Defense Immune System : Network Intrusion Detection with a Multiobjective Evolutionary Programming Approach
暂无分享,去创建一个
[1] Takuji Nishimura,et al. Mersenne twister: a 623-dimensionally equidistributed uniform pseudo-random number generator , 1998, TOMC.
[2] David B. Fogel,et al. Revisiting evolutionary programming , 1998, Defense, Security, and Sensing.
[3] Patrick D. Spagon. Statistical quality assurance methods for engineers , 1998 .
[4] Stephanie Forrest,et al. Principles of a computer immune system , 1998, NSPW '97.
[5] D. Dasgupta. Artificial Immune Systems and Their Applications , 1998, Springer Berlin Heidelberg.
[6] Dipankar Dasgupta,et al. Immunity-Based Intrusion Detection System: A General Framework , 1999 .
[7] Gary B. Lamont,et al. Multiobjective evolutionary algorithms: classifications, analyses, and new innovations , 1999 .
[8] Peter J. Bentley,et al. An artificial immune model for network intrusion detection , 1999 .
[9] Stephanie Forrest,et al. Architecture for an Artificial Immune System , 2000, Evolutionary Computation.
[10] David B. Fogel,et al. Evolution-ary Computation 1: Basic Algorithms and Operators , 2000 .
[11] Gary B. Lamont,et al. Multiobjective Evolutionary Algorithms: Analyzing the State-of-the-Art , 2000, Evolutionary Computation.
[12] William M. Spears,et al. Evolving Finite-State Machine Strategies for Protecting Resources , 2000, ISMIS.
[13] Zbigniew Michalewicz,et al. Evolutionary Computation 2 : Advanced Algorithms and Operators , 2000 .
[14] Kevin P. Anchor,et al. CDIS: Towards a Computer Immune System for Detecting Network Intrusions , 2001, Recent Advances in Intrusion Detection.
[15] Gary B. Lamont,et al. A Statistical Comparison of Multiobjective Evolutionary Algorithms Including the MOMGA-II , 2001, EMO.
[16] Peter J. Bentley,et al. An evaluation of negative selection in an artificial immune system for network intrusion detection , 2001 .
[17] Fabio A. González,et al. An Intelligent Decision Support System for Intrusion Detection and Response , 2001, MMM-ACNS.
[18] Peter J. Bentley,et al. Towards an artificial immune system for network intrusion detection: an investigation of clonal selection with a negative selection operator , 2001, Proceedings of the 2001 Congress on Evolutionary Computation (IEEE Cat. No.01TH8546).
[19] S. Forrest,et al. Immunology as Information Processing , 2001 .
[20] Kevin P. Anchor,et al. The computer defense immune system: current and future research in intrusion detection , 2002, Proceedings of the 2002 Congress on Evolutionary Computation. CEC'02 (Cat. No.02TH8600).
[21] Stephanie Forrest,et al. Revisiting LISYS: parameters and normal behavior , 2002, Proceedings of the 2002 Congress on Evolutionary Computation. CEC'02 (Cat. No.02TH8600).
[22] Peter J. Bentley,et al. Towards an artificial immune system for network intrusion detection: an investigation of dynamic clonal selection , 2002, Proceedings of the 2002 Congress on Evolutionary Computation. CEC'02 (Cat. No.02TH8600).
[23] Stefan Axelsson,et al. Intrusion Detection Systems: A Survey and Taxonomy , 2002 .
[24] Gary B. Lamont,et al. Evolutionary Algorithms for Solving Multi-Objective Problems , 2002, Genetic Algorithms and Evolutionary Computation.
[25] Kevin P. Anchor,et al. An evolutionary programming approach for detecting novel computer network attacks , 2002, Proceedings of the 2002 Congress on Evolutionary Computation. CEC'02 (Cat. No.02TH8600).
[26] David B. Fogel. Evolutionary Computation: Principles and Practice for Signal Processing , 2004 .
[27] Dr. Zbigniew Michalewicz,et al. How to Solve It: Modern Heuristics , 2004 .