Immune-inspired Algorithm for Anomaly Detection

[1]  O. Eremin,et al.  Dendritic cells (I): Biological functions. , 2001, Journal of the Royal College of Surgeons of Edinburgh.

[2]  Wenke Lee,et al.  Simulating Internet worms , 2004, The IEEE Computer Society's 12th Annual International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunications Systems, 2004. (MASCOTS 2004). Proceedings..

[3]  D. Dasgupta Artificial Immune Systems and Their Applications , 1998, Springer Berlin Heidelberg.

[4]  Dipankar Dasgupta,et al.  An Overview of Artificial Immune Systems and Their Applications , 1993 .

[5]  R. Steinman,et al.  Differentiation of monocytes into dendritic cells in a model of transendothelial trafficking. , 1998, Science.

[6]  Jonathan Timmis,et al.  Artificial Immune Systems: A New Computational Intelligence Approach , 2003 .

[7]  M. Kapsenberg Dendritic-cell control of pathogen-driven T-cell polarization , 2003, Nature Reviews Immunology.

[8]  Stephanie Forrest,et al.  An immunological model of distributed detection and its application to computer security , 1999 .

[9]  A. Perelson,et al.  Predicting the size of the T-cell receptor and antibody combining region from consideration of efficient self-nonself discrimination. , 1993, Proceedings of the National Academy of Sciences of the United States of America.

[10]  Matthew M. Williamson,et al.  Throttling viruses: restricting propagation to defeat malicious mobile code , 2002, 18th Annual Computer Security Applications Conference, 2002. Proceedings..

[11]  Wayne A. Jansen,et al.  Intrusion detection with mobile agents , 2002, Comput. Commun..

[12]  V. Kronin,et al.  Dendritic cells and T lymphocytes: developmental and functional interactions. , 2007, Ciba Foundation symposium.

[13]  Stephanie Forrest,et al.  Infect Recognize Destroy , 1996 .

[14]  C. Anderson,et al.  Danger: the view from the bottom of the cliff. , 2000, Seminars in immunology.

[15]  C. Caux,et al.  Dendritic Cell Development: Multiple Pathways to Nature's Adjuvants , 1997, Stem cells.

[16]  P. Matzinger,et al.  An innate sense of danger. , 1998, Seminars in immunology.

[17]  Ki-Won Yeom,et al.  An Immune System Inspired Approach of Collaborative Intrusion Detection System Using Mobile Agents in Wireless Ad Hoc Networks , 2005, CIS.

[18]  Uwe Aickelin,et al.  The Danger Theory and Its Application to Artificial Immune Systems , 2008, ArXiv.

[19]  Leandro Nunes de Castro,et al.  An Overview of Artificial Immune Systems , 2004 .

[20]  Uwe Aickelin,et al.  Towards a Conceptual Framework for Innate Immunity , 2005, ICARIS.

[21]  J. Villadangos,et al.  No driving without a license , 2005, Nature Immunology.

[22]  P. Matzinger The Danger Model: A Renewed Sense of Self , 2002, Science.