An immune based dynamic intrusion detection model
暂无分享,去创建一个
[1] Paul Helman,et al. An immunological approach to change detection: algorithms, analysis and implications , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[2] Alan S. Perelson,et al. Self-nonself discrimination in a computer , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.
[3] Stephanie Forrest,et al. Infect Recognize Destroy , 1996 .
[4] Jonathan Timmis,et al. Artificial immune systems as a novel soft computing paradigm , 2003, Soft Comput..
[5] Thomas Bäck,et al. An Overview of Evolutionary Computation , 1993, ECML.
[6] Rogério de Lemos,et al. Negative Selection: How to Generate Detectors , 2002 .
[7] Peter J. Bentley,et al. Towards an artificial immune system for network intrusion detection: an investigation of dynamic clonal selection , 2002, Proceedings of the 2002 Congress on Evolutionary Computation. CEC'02 (Cat. No.02TH8600).
[8] Dipankar Dasgupta,et al. Immunity-Based Intrusion Detection System: A General Framework , 1999 .
[9] Gregg H. Gunsch,et al. An artificial immune system architecture for computer security applications , 2002, IEEE Trans. Evol. Comput..
[10] G. Weisbuch,et al. Immunology for physicists , 1997 .
[11] Stephanie Forrest,et al. Immunity by design: an artificial immune system , 1999 .
[12] Jonathan Timmis,et al. Artificial Immune Systems: A New Computational Intelligence Approach , 2003 .
[13] Stephanie Forrest,et al. Architecture for an Artificial Immune System , 2000, Evolutionary Computation.
[14] Xiao Ren. Artificial Immune System: Principle, Models, Analysis and Perspectives , 2002 .
[15] Jiao Li,et al. Development and Prospect of the Artificial Immune System , 2003 .
[16] Tao Li,et al. An immunity based network security risk estimation , 2005, Science in China Series F: Information Sciences.