Intelligent agent based artificial immune system for computer security—a review
暂无分享,去创建一个
[1] Azzedine Boukerche,et al. A hybrid artificial immune and mobile agent intrusion detection based model for computer network operations , 2005, 19th IEEE International Parallel and Distributed Processing Symposium.
[2] Tao Li,et al. Distributed agents model for intrusion detection based on AIS , 2009, Knowl. Based Syst..
[3] Davood Maleki,et al. An Intrusion Detection Technique using Co-Co Immune System for Distributed Data Networks (CoCo -ISD) , 2008 .
[4] Jean-Yves Le Boudec,et al. An Artificial Immune System Approach to Misbehavior Detection in Mobile Ad Hoc Networks , 2004, BioADIT.
[5] Ajith Abraham,et al. Artificial immune system inspired behavior-based anti-spam filter , 2007, Soft Comput..
[6] Ki-Won Yeom,et al. An Immune System Inspired Approach of Collaborative Intrusion Detection System Using Mobile Agents in Wireless Ad Hoc Networks , 2005, CIS.
[7] Sahin Albayrak,et al. Application-level Simulation for Network Security , 2010, Simul..
[8] Julie Greensmith,et al. Detecting Danger: The Dendritic Cell Algorithm , 2010, ArXiv.
[9] Wenjian Luo,et al. Designing Abstract Immune Mobile Agents for Distributed Intrusion Detection , 2005, 2005 International Conference on Neural Networks and Brain.
[10] Marco Carvalho,et al. Agent-Based Immunological Intrusion Detection System for Mobile Ad-Hoc Networks , 2008, ICCS.
[11] Takeshi Okamoto,et al. Framework of an Immunity-Based Anomaly Detection System for User Behavior , 2007, KES.
[12] Jin Yang,et al. Immunity and Mobile Agent Based Grid Intrusion Detection , 2006, ICIC.
[13] Michael Hilker,et al. Next Challenges in Bringing Artificial Immune Systems to Production in Network Security , 2008, ArXiv.
[14] Yoshiteru Ishida,et al. The Next Generation of Immunity-Based Systems: From Specific Recognition to Computational Intelligence , 2008, Computational Intelligence: A Compendium.
[15] Dipankar Dasgupta,et al. Immunity-Based Intrusion Detection System: A General Framework , 1999 .
[16] Gregg H. Gunsch,et al. An artificial immune system architecture for computer security applications , 2002, IEEE Trans. Evol. Comput..
[17] Thomas Magedanz,et al. GRASSHOPPER - A UNIVERSAL AGENT PLATFORM BASED ON OMG MASIF AND FIPA STANDARDS , 2000 .
[18] Qiang Hu,et al. Immune Multi-agent Network Intrusion Defense Model , 2007, Third International Conference on Natural Computation (ICNC 2007).
[19] Yoshiteru Ishida,et al. Mutual tests using immunity-based diagnostic mobile agents in distributed intrusion detection systems , 2004, Artificial Life and Robotics.
[20] Chen Zhongmin,et al. The Algorithm Design of Agent for Detecting and Analyzing Data in Intrusion Detection Based on Immune Principle , 2007, 2007 International Conference on Wireless Communications, Networking and Mobile Computing.
[21] Julie Greensmith,et al. Immune system approaches to intrusion detection – a review , 2004, Natural Computing.
[22] Uwe Aickelin,et al. The Danger Theory and Its Application to Artificial Immune Systems , 2008, ArXiv.
[23] Sahin Albayrak,et al. Application-level simulation for network security , 2008, Simutools 2008.
[24] Azzedine Boukerche,et al. An agent based and biological inspired real-time intrusion detection and security model for computer network operations , 2007, Comput. Commun..
[25] Julie Greensmith,et al. Immune System Approaches to Intrusion Detection - A Review , 2004, ICARIS.
[26] Tao Li,et al. Grid Intrusion Detection Based on Immune Agent , 2006, ICNC.
[27] Tao Li,et al. Multi-agent network intrusion active defense model based on immune theory , 2006, Wuhan University Journal of Natural Sciences.
[28] Zhou Ji,et al. Artificial immune system (AIS) research in the last five years , 2003, The 2003 Congress on Evolutionary Computation, 2003. CEC '03..
[29] Tansu Alpcan,et al. A Cooperative AIS Framework for Intrusion Detection , 2007, 2007 IEEE International Conference on Communications.
[30] Tao Li,et al. An Immune Mobile Agent Based Grid Intrusion Detection Model , 2006, SEAL.
[31] Tao Li,et al. Immune Multi-agent Active Defense Model for Network Intrusion , 2006, SEAL.
[32] Joos Vandewalle,et al. (How) can mobile agents do secure electronic transactions on untrusted hosts? A survey of the security issues and the current solutions , 2003, TOIT.