Engineering an Immune System 1

[1]  Stephanie Forrest,et al.  Architecture for an Artificial Immune System , 2000, Evolutionary Computation.

[2]  R. Vance,et al.  Cutting Edge Commentary: A Copernican Revolution? Doubts About the Danger Theory1 , 2000, The Journal of Immunology.

[3]  I. Cohen,et al.  Discrimination and dialogue in the immune system. , 2000, Seminars in immunology.

[4]  Stephanie Forrest,et al.  An immunological model of distributed detection and its application to computer security , 1999 .

[5]  Stephanie Forrest,et al.  Intrusion Detection Using Sequences of System Calls , 1998, J. Comput. Secur..

[6]  Paul Helman,et al.  An immunological approach to change detection: algorithms, analysis and implications , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.

[7]  Patrik D'haeseleer,et al.  An immunological approach to change detection: theoretical results , 1996, Proceedings 9th IEEE Computer Security Foundations Workshop.

[8]  Alan S. Perelson,et al.  Self-nonself discrimination in a computer , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.

[9]  P. Matzinger Tolerance, danger, and the extended family. , 1994, Annual review of immunology.

[10]  Todd L. Heberlein,et al.  Network intrusion detection , 1994, IEEE Network.

[11]  F. Burnet,et al.  The production of antibodies , 1949 .