Biological Approach to System Information Security
暂无分享,去创建一个
[1] Victor A. Skormin,et al. Agent-based Model of Information Security System: Architecture and Framework for Coordinated Behavior Specification , 1999, CEEMAS.
[2] M. Eaman. Immune system. , 2000, Nursing standard (Royal College of Nursing (Great Britain) : 1987).
[3] Victor A. Skormin,et al. Applications of cluster analysis in diagnostics-related problems , 1999, 1999 IEEE Aerospace Conference. Proceedings (Cat. No.99TH8403).
[4] A S Perelson,et al. Pattern formation in one- and two-dimensional shape-space models of the immune system. , 1992, Journal of theoretical biology.
[5] Udo W. Pooch,et al. Cooperating security managers: a peer-based intrusion detection system , 1996, IEEE Netw..
[6] C A Bona,et al. V genes encoding autoantibodies: molecular and phenotypic characteristics. , 1988, Annual review of immunology.
[7] T. Ternynck,et al. The natural autoantibodies system: between hypotheses and facts. , 1993, Molecular immunology.
[8] C. Janeway. Immunobiology: The Immune System in Health and Disease , 1996 .
[9] Stephanie Forrest,et al. Principles of a computer immune system , 1998, NSPW '97.
[10] J. F. McClary,et al. NADIR: An automated system for detecting network intrusion and misuse , 1993, Comput. Secur..
[11] Alexander O. Tarakanov,et al. Formal Peptide as a Basic Agent of Immune Networks: from Natural Prototype to Mathematical Theory and Applications , 1999, CEEMAS.
[12] Philip D. Wasserman,et al. Neural computing - theory and practice , 1989 .
[13] Karl N. Levitt,et al. GrIDS A Graph-Based Intrusion Detection System for Large Networks , 1996 .
[14] Stephanie Forrest,et al. Infect Recognize Destroy , 1996 .
[15] Eugene H. Spafford,et al. An architecture for intrusion detection using autonomous agents , 1998, Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217).
[16] Jerne Nk. Towards a network theory of the immune system. , 1974 .
[17] F. Burnet. A modification of jerne's theory of antibody production using the concept of clonal selection , 1976, CA: a cancer journal for clinicians.
[18] Alexander O. Tarakanov,et al. Information Security with Formal Immune Networks , 2001, MMM-ACNS.
[19] Victor A. Skormin,et al. BASIS: A Biological Approach to System Information Security , 2001, MMM-ACNS.
[20] Victor A. Skormin,et al. Data mining technology for failure prognostic of avionics , 2002 .
[21] Michael D. Vose,et al. The simple genetic algorithm - foundations and theory , 1999, Complex adaptive systems.