Immune-inspired Algorithm for Anomaly Detection
暂无分享,去创建一个
[1] O. Eremin,et al. Dendritic cells (I): Biological functions. , 2001, Journal of the Royal College of Surgeons of Edinburgh.
[2] Wenke Lee,et al. Simulating Internet worms , 2004, The IEEE Computer Society's 12th Annual International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunications Systems, 2004. (MASCOTS 2004). Proceedings..
[3] D. Dasgupta. Artificial Immune Systems and Their Applications , 1998, Springer Berlin Heidelberg.
[4] Dipankar Dasgupta,et al. An Overview of Artificial Immune Systems and Their Applications , 1993 .
[5] R. Steinman,et al. Differentiation of monocytes into dendritic cells in a model of transendothelial trafficking. , 1998, Science.
[6] Jonathan Timmis,et al. Artificial Immune Systems: A New Computational Intelligence Approach , 2003 .
[7] M. Kapsenberg. Dendritic-cell control of pathogen-driven T-cell polarization , 2003, Nature Reviews Immunology.
[8] Stephanie Forrest,et al. An immunological model of distributed detection and its application to computer security , 1999 .
[9] A. Perelson,et al. Predicting the size of the T-cell receptor and antibody combining region from consideration of efficient self-nonself discrimination. , 1993, Proceedings of the National Academy of Sciences of the United States of America.
[10] Matthew M. Williamson,et al. Throttling viruses: restricting propagation to defeat malicious mobile code , 2002, 18th Annual Computer Security Applications Conference, 2002. Proceedings..
[11] Wayne A. Jansen,et al. Intrusion detection with mobile agents , 2002, Comput. Commun..
[12] V. Kronin,et al. Dendritic cells and T lymphocytes: developmental and functional interactions. , 2007, Ciba Foundation symposium.
[13] Stephanie Forrest,et al. Infect Recognize Destroy , 1996 .
[14] C. Anderson,et al. Danger: the view from the bottom of the cliff. , 2000, Seminars in immunology.
[15] C. Caux,et al. Dendritic Cell Development: Multiple Pathways to Nature's Adjuvants , 1997, Stem cells.
[16] P. Matzinger,et al. An innate sense of danger. , 1998, Seminars in immunology.
[17] Ki-Won Yeom,et al. An Immune System Inspired Approach of Collaborative Intrusion Detection System Using Mobile Agents in Wireless Ad Hoc Networks , 2005, CIS.
[18] Uwe Aickelin,et al. The Danger Theory and Its Application to Artificial Immune Systems , 2008, ArXiv.
[19] Leandro Nunes de Castro,et al. An Overview of Artificial Immune Systems , 2004 .
[20] Uwe Aickelin,et al. Towards a Conceptual Framework for Innate Immunity , 2005, ICARIS.
[21] J. Villadangos,et al. No driving without a license , 2005, Nature Immunology.
[22] P. Matzinger. The Danger Model: A Renewed Sense of Self , 2002, Science.