Information Security with Formal Immune Networks
暂无分享,去创建一个
[1] Alexander O. Tarakanov,et al. Formal Peptide as a Basic Agent of Immune Networks: from Natural Prototype to Mathematical Theory and Applications , 1999, CEEMAS.
[2] A S Perelson,et al. Pattern formation in one- and two-dimensional shape-space models of the immune system. , 1992, Journal of theoretical biology.
[3] D. Dasgupta. Artificial Immune Systems and Their Applications , 1998, Springer Berlin Heidelberg.
[4] D. Dasgupta,et al. A formal model of an artificial immune system. , 2000, Bio Systems.
[5] Walter Bender,et al. Techniques for Data Hiding , 1996, IBM Syst. J..
[6] Andrew Adamatzky,et al. Mathematical Basis of Complex Ecological Evaluation , 2000 .
[7] Stephanie Forrest,et al. Principles of a computer immune system , 1998, NSPW '97.
[8] Philip D. Wasserman,et al. Neural computing - theory and practice , 1989 .
[9] Stephanie Forrest,et al. Infect Recognize Destroy , 1996 .
[10] Stephanie Forrest,et al. Immunity by design: an artificial immune system , 1999 .
[11] Andrew Adamatzky,et al. Virtual clothing in hybrid cellular automata , 2002 .
[12] Dipankar Dasgupta,et al. Immunity-Based Intrusion Detection System: A General Framework , 1999 .
[13] Andrew S. Tanenbaum,et al. Computer networks (3rd ed.) , 1996 .