An Immune-Based Model for Service Survivability
暂无分享,去创建一个
Tao Li | Jinquan Zeng | Caiming Liu | Lingxi Peng | Feixian Sun | XiaoJie Liu | Lingxi Peng | Caiming Liu | Tao Li | Jinquan Zeng | Xiaojie Liu | Feixian Sun
[1] Stephanie Forrest,et al. Infect Recognize Destroy , 1996 .
[2] Nancy R. Mead,et al. Requirements definition for survivable network systems , 1998, Proceedings of IEEE International Symposium on Requirements Engineering: RE '98.
[3] Gregg H. Gunsch,et al. An artificial immune system architecture for computer security applications , 2002, IEEE Trans. Evol. Comput..
[4] Peter J. Bentley,et al. Towards an artificial immune system for network intrusion detection: an investigation of dynamic clonal selection , 2002, Proceedings of the 2002 Congress on Evolutionary Computation. CEC'02 (Cat. No.02TH8600).
[5] John McHugh,et al. Life-Cycle Models for Survivable Systems , 2002 .
[6] Bharat B. Madan,et al. Modeling and quantification of security attributes of software systems , 2002, Proceedings International Conference on Dependable Systems and Networks.
[7] Guan Xiao-hong. An Intrusion Detection Framework Based on Information Fusion , 2003 .
[8] Kevin J. Sullivan,et al. Towards a rigorous definition of information system survivability , 2003, Proceedings DARPA Information Survivability Conference and Exposition.
[9] Xiang Hong. Model for the Deliver of Essential Services in the Survivability Network System Based on Mobile Agent , 2004 .
[10] Vickie R. Westmark. A definition for information system survivability , 2004, 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the.
[11] Song Chen. A Real-Time Method of Risk Evaluation Based on ArtificialImmune System for Network Security , 2005 .
[12] L. Chuanyou,et al. Systemic defense signaling in tomato , 2005 .
[13] Tao Li,et al. An immune based dynamic intrusion detection model , 2005 .
[14] Joseph L. Kirschvink,et al. Late Cenozoic high-resolution magnetostratigraphy in the Kunlun Pass Basin and its implications for the uplift of the northern Tibetan Plateau , 2005 .
[15] Tao Li,et al. An immunity based network security risk estimation , 2005, Science in China Series F: Information Sciences.
[16] Uwe Aickelin,et al. Data Reduction in Intrusion Alert Correlation , 2008, ArXiv.