Distributed Agent Based Model for Intrusion Detection System Based on Artificial Immune System
暂无分享,去创建一个
Sureswaran Ramadass | Farhoud Hosseinpour | Payam Vahdani Amoli | Andrew Meulenberg | Zahra Moghaddasi | P. V. Amoli | S. Ramadass | A. Meulenberg | Farhoud Hosseinpour | Z. Moghaddasi
[1] Sugata Sanyal,et al. Evolution Induced Secondary Immunity: An Artificial Immune System Based Intrusion Detection System , 2008, 2008 7th Computer Information Systems and Industrial Management Applications.
[2] Alan S. Perelson,et al. Self-nonself discrimination in a computer , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.
[3] Uwe Aickelin,et al. Danger Theory: The Link between AIS and IDS? , 2003, ICARIS.
[4] Yi Guan,et al. Multi-word-Agent Autonomy Learning Based on Adaptive Immune Theories , 2013 .
[5] Ki-Won Yeom,et al. An Immune System Inspired Approach of Collaborative Intrusion Detection System Using Mobile Agents in Wireless Ad Hoc Networks , 2005, CIS.
[6] P. Matzinger. The Danger Model: A Renewed Sense of Self , 2002, Science.
[7] Mohammad Zulkernine,et al. DIDMA: a distributed intrusion detection system using mobile agents , 2005, Sixth International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing and First ACIS International Workshop on Self-Assembling Wireless Network.
[8] Chen Guoqiang,et al. Community Detection in Complex Networks Using Immune Clone Selection Algorithm , 2011 .
[9] Feixian Sun,et al. Research of Immunity-based Anomaly Intrusion Detection and Its Application for Security Evaluation of E-government Affair Systems , 2012 .
[10] Jonathan Timmis,et al. Theoretical advances in artificial immune systems , 2008, Theor. Comput. Sci..
[11] Farhoud Hosseinpour,et al. Design of a new distributed model for Intrusion Detection System based on Artificial Immune System , 2010, 2010 6th International Conference on Advanced Information Management and Service (IMS).
[12] Haidong Fu,et al. Design of a Four-Layer Model Based on Danger Theory and AIS for IDS , 2007, 2007 International Conference on Wireless Communications, Networking and Mobile Computing.
[13] Zhiguo Zhao,et al. An artificial immunity-based proactive defense system , 2007, 2007 IEEE International Conference on Robotics and Biomimetics (ROBIO).
[14] Peter Braun,et al. Mobile Agents: Basic Concepts, Mobility Models, and the Tracy Toolkit , 2004 .
[15] Robert L. Fanelli. A Hybrid Model for Immune Inspired Network Intrusion Detection , 2008, ICARIS.
[16] Alan S. Perelson,et al. The immune system, adaptation, and machine learning , 1986 .
[17] Chung-Ming Ou,et al. Multi-Agent Artificial Immune Systems (MAAIS) for Intrusion Detection: Abstraction from Danger Theory , 2009, KES-AMSTA.
[18] Kamalrulnizam Abu Bakar,et al. Survey on Artificial Immune System as a Bio-inspired Technique for Anomaly Based Intrusion Detection Systems , 2010, 2010 International Conference on Intelligent Networking and Collaborative Systems.
[19] Julie Greensmith,et al. Immune System Approaches to Intrusion Detection - A Review , 2004, ICARIS.
[20] Thomas Stibor,et al. Foundations of r-contiguous matching in negative selection for anomaly detection , 2009, Natural Computing.
[21] F. Azuaje. Artificial Immune Systems: A New Computational Intelligence Approach , 2003 .
[22] Stephanie Forrest,et al. Architecture for an Artificial Immune System , 2000, Evolutionary Computation.
[23] Tao Li,et al. Distributed agents model for intrusion detection based on AIS , 2009, Knowl. Based Syst..