Design of a new distributed model for Intrusion Detection System based on Artificial Immune System
暂无分享,去创建一个
Farhoud Hosseinpour | Kamalrulnizam Abu Bakar | A. Hatami Hardoroudi | A. Farhang Dareshur | Kamalrulnizam Bin Abu Bakar | Farhoud Hosseinpour | A. Hatami Hardoroudi | A. Farhang Dareshur
[1] Alan S. Perelson,et al. The immune system, adaptation, and machine learning , 1986 .
[2] F. Azuaje. Artificial Immune Systems: A New Computational Intelligence Approach , 2003 .
[3] Ki-Won Yeom,et al. An Immune System Inspired Approach of Collaborative Intrusion Detection System Using Mobile Agents in Wireless Ad Hoc Networks , 2005, CIS.
[4] Thomas Stibor,et al. Foundations of r-contiguous matching in negative selection for anomaly detection , 2009, Natural Computing.
[5] Tao Li,et al. Distributed agents model for intrusion detection based on AIS , 2009, Knowl. Based Syst..
[6] Robert L. Fanelli. A Hybrid Model for Immune Inspired Network Intrusion Detection , 2008, ICARIS.
[7] Mohammad Zulkernine,et al. DIDMA: a distributed intrusion detection system using mobile agents , 2005, Sixth International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing and First ACIS International Workshop on Self-Assembling Wireless Network.
[8] Alan S. Perelson,et al. Self-nonself discrimination in a computer , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.
[9] Zhiguo Zhao,et al. An artificial immunity-based proactive defense system , 2007, 2007 IEEE International Conference on Robotics and Biomimetics (ROBIO).
[10] Chung-Ming Ou,et al. Multi-Agent Artificial Immune Systems (MAAIS) for Intrusion Detection: Abstraction from Danger Theory , 2009, KES-AMSTA.
[11] Haidong Fu,et al. Design of a Four-Layer Model Based on Danger Theory and AIS for IDS , 2007, 2007 International Conference on Wireless Communications, Networking and Mobile Computing.
[12] Jonathan Timmis,et al. Theoretical advances in artificial immune systems , 2008, Theor. Comput. Sci..
[13] P. Matzinger. The Danger Model: A Renewed Sense of Self , 2002, Science.
[14] P. Matzinger,et al. Essay 1: The Danger Model in Its Historical Context , 2001, Scandinavian journal of immunology.
[15] Uwe Aickelin,et al. Danger Theory: The Link between AIS and IDS? , 2003, ICARIS.
[16] Sugata Sanyal,et al. Evolution Induced Secondary Immunity: An Artificial Immune System Based Intrusion Detection System , 2008, 2008 7th Computer Information Systems and Industrial Management Applications.
[17] Stephanie Forrest,et al. Architecture for an Artificial Immune System , 2000, Evolutionary Computation.
[18] Kamalrulnizam Abu Bakar,et al. Survey on Artificial Immune System as a Bio-inspired Technique for Anomaly Based Intrusion Detection Systems , 2010, 2010 International Conference on Intelligent Networking and Collaborative Systems.