Network Immunity: What can we learn from nature for network protection?
暂无分享,去创建一个
[1] Hartmut Pohl. Zur Technik der heimlichen Online-Durchsuchung , 2007, Datenschutz und Datensicherheit - DuD.
[2] Sushil Jajodia,et al. Abstraction-based intrusion detection in distributed environments , 2001, TSEC.
[3] Elias Levy. Criminals Become Tech Savvy , 2004, IEEE Secur. Priv..
[4] Simon M. Garrett,et al. How Do We Evaluate Artificial Immune Systems? , 2005, Evolutionary Computation.
[5] D. Dasgupta,et al. Advances in artificial immune systems , 2006, IEEE Computational Intelligence Magazine.
[6] Christos Douligeris,et al. Network Security , 2005 .
[7] Shian-Shyong Tseng,et al. A study of alert-based collaborative defense , 2005, 8th International Symposium on Parallel Architectures,Algorithms and Networks (ISPAN'05).
[8] Frédéric Cuppens,et al. Alert correlation in a cooperative intrusion detection framework , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[9] Jerne Nk. Towards a network theory of the immune system. , 1974 .
[10] Biswanath Mukherjee,et al. DIDS (distributed intrusion detection system)—motivation, architecture, and an early prototype , 1997 .
[11] Sushil Jajodia,et al. CARDS: A Distributed System for Detecting Coordinated Attacks , 2000, SEC.
[12] Giovanni Vigna,et al. NetSTAT: A Network-based Intrusion Detection System , 1999, J. Comput. Secur..
[13] Hervé Debar,et al. Aggregation and Correlation of Intrusion-Detection Alerts , 2001, Recent Advances in Intrusion Detection.
[14] Leandro Nunes de Castro,et al. The Clonal Selection Algorithm with Engineering Applications 1 , 2000 .
[15] Alan S. Perelson,et al. Self-nonself discrimination in a computer , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.
[16] Fabio A. González,et al. A comparative analysis of artificial immune network models , 2005, GECCO '05.