An Artificial Immune System Approach to Misbehavior Detection in Mobile Ad Hoc Networks
暂无分享,去创建一个
[1] Fabio A. González,et al. An immunity-based technique to characterize intrusions in computer networks , 2002, IEEE Trans. Evol. Comput..
[2] Stephanie Forrest,et al. An immunological model of distributed detection and its application to computer security , 1999 .
[3] Mario Gerla,et al. GloMoSim: a library for parallel simulation of large-scale wireless networks , 1998 .
[4] Jean-Yves Le Boudec,et al. Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.
[5] F. Azuaje. Artificial Immune Systems: A New Computational Intelligence Approach , 2003 .
[6] J. Urbain,et al. IDIOTYPIC NETWORKS, RESTRICTIVE RECOGNITION, AND REGULATION IN THE IMMUNE SYSTEM , 1980 .
[7] P. Matzinger. Tolerance, danger, and the extended family. , 1994, Annual review of immunology.
[8] L. Sompayrac,et al. How the immune system works , 1999 .
[9] Peter J. Bentley,et al. The Artificial Immune System for Network Intrusion Detection : An Investigation of Clonal Selection with a Negative Selection Operator , 2001 .
[10] Jonathan Timmis,et al. Artificial immune systems - a new computational intelligence paradigm , 2002 .
[11] David B. Johnson,et al. The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks , 2003 .
[12] Jean-Yves Le Boudec,et al. The Effect of Rumor Spreading in Reputation Systems for Mobile Ad-hoc Networks , 2003 .
[13] Peter J. Bentley,et al. An artificial immune model for network intrusion detection , 1999 .
[14] Peter J. Bentley,et al. An evaluation of negative selection in an artificial immune system for network intrusion detection , 2001 .
[15] Jean-Yves Le Boudec,et al. Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.
[16] David E. Goldberg,et al. FOX-GA: A Genetic Algorithm for Generating and Analyzing Battlefield Courses of Action , 1999, Evolutionary Computation.
[17] Chen-Nee Chuah,et al. Analysis of link failures in an IP backbone , 2002, IMW '02.
[18] Leandro Nunes de Castro,et al. Artificial Immune Systems: Part I-Basic Theory and Applications , 1999 .
[19] Peter J. Bentley,et al. Towards an artificial immune system for network intrusion detection: an investigation of dynamic clonal selection , 2002, Proceedings of the 2002 Congress on Evolutionary Computation. CEC'02 (Cat. No.02TH8600).
[20] S. Buchegger,et al. A Robust Reputation System for Mobile Ad-hoc Networks , 2003 .
[21] Stephanie Forrest,et al. Architecture for an Artificial Immune System , 2000, Evolutionary Computation.
[22] P. Matzinger,et al. Essay 1: The Danger Model in Its Historical Context , 2001, Scandinavian journal of immunology.
[23] T. Mak,et al. ‘Order from disorder sprung’: recognition and regulation in the immune system , 2003, Philosophical Transactions of the Royal Society of London. Series A: Mathematical, Physical and Engineering Sciences.
[24] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.