Engineering an Immune System 1
暂无分享,去创建一个
[1] Stephanie Forrest,et al. Architecture for an Artificial Immune System , 2000, Evolutionary Computation.
[2] R. Vance,et al. Cutting Edge Commentary: A Copernican Revolution? Doubts About the Danger Theory1 , 2000, The Journal of Immunology.
[3] I. Cohen,et al. Discrimination and dialogue in the immune system. , 2000, Seminars in immunology.
[4] Stephanie Forrest,et al. An immunological model of distributed detection and its application to computer security , 1999 .
[5] Stephanie Forrest,et al. Intrusion Detection Using Sequences of System Calls , 1998, J. Comput. Secur..
[6] Paul Helman,et al. An immunological approach to change detection: algorithms, analysis and implications , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[7] Patrik D'haeseleer,et al. An immunological approach to change detection: theoretical results , 1996, Proceedings 9th IEEE Computer Security Foundations Workshop.
[8] Alan S. Perelson,et al. Self-nonself discrimination in a computer , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.
[9] P. Matzinger. Tolerance, danger, and the extended family. , 1994, Annual review of immunology.
[10] Todd L. Heberlein,et al. Network intrusion detection , 1994, IEEE Network.
[11] F. Burnet,et al. The production of antibodies , 1949 .