Artificial Immune Danger Theory Based Model for Network Security Evaluation
暂无分享,去创建一个
[1] Uwe Aickelin,et al. Cooperative Automated Worm Response and Detection ImmuNe ALgorithm(CARDINAL) Inspired by T-Cell Immunity and Tolerance , 2005, ICARIS.
[2] Liu Nian,et al. Research on Network Security Situation Awareness Technology Based on Artificial Immunity System , 2009, 2009 International Forum on Information Technology and Applications.
[3] Feixian Sun,et al. An Immune Danger Theory Inspired Model for Network Security Threat Awareness , 2010, 2010 Second International Conference on Multimedia and Information Technology.
[4] Feng Xu,et al. Antibody Concentration Based Method for Network Security Situation Awareness , 2009, 2009 3rd International Conference on Bioinformatics and Biomedical Engineering.
[5] Dipankar Dasgupta,et al. Immunity-Based Intrusion Detection System: A General Framework , 1999 .
[6] P. Matzinger. Tolerance, danger, and the extended family. , 1994, Annual review of immunology.
[7] Joseph L. Kirschvink,et al. Late Cenozoic high-resolution magnetostratigraphy in the Kunlun Pass Basin and its implications for the uplift of the northern Tibetan Plateau , 2005 .
[8] Erica Klarreich,et al. Inspired by immunity , 2002, Nature.
[9] Du Hai-feng,et al. A noval algorithm of artificial immune system for high-dimensional function numerical optimization∗ , 2005 .
[10] Mohd Aizaini Maarof,et al. Polymorphism and Danger Susceptibility of System Call DASTONs , 2005, ICARIS.
[11] P. Matzinger. The Danger Model: A Renewed Sense of Self , 2002, Science.
[12] Stephanie Forrest,et al. Infect Recognize Destroy , 1996 .
[13] Jonathan Timmis,et al. Artificial immune systems as a novel soft computing paradigm , 2003, Soft Comput..
[14] Feixian Sun,et al. An Immune Danger Theory Inspired Model for Network Security Monitoring , 2010, 2010 International Conference on Challenges in Environmental Science and Computer Engineering.
[15] Yu Zhang,et al. A Dynamic Immunity-Based Model for Computer Virus Detection , 2008, 2008 International Symposiums on Information Processing.
[16] Alex A. Freitas,et al. Towards a Danger Theory Inspired Artificial Immune System for Web Mining , 2005 .
[17] Jinquan Zeng,et al. Gene-Certificate Based Method for Network Trust , 2008, 2008 2nd International Conference on Bioinformatics and Biomedical Engineering.
[18] Uwe Aickelin,et al. The Danger Theory and Its Application to Artificial Immune Systems , 2008, ArXiv.
[19] Chuankun Wu,et al. Construction and enumeration of Boolean functions with maximum algebraic immunity , 2009, Science in China Series F: Information Sciences.
[20] Stephanie Forrest,et al. Architecture for an Artificial Immune System , 2000, Evolutionary Computation.
[21] Anne N. De Roeck,et al. Multimodal Dynamic Optimization: From Evolutionary Algorithms to Artificial Immune Systems , 2007, ICARIS.
[22] P. Matzinger,et al. Essay 1: The Danger Model in Its Historical Context , 2001, Scandinavian journal of immunology.
[23] Du Hai-feng,et al. Optimal approximation of linear systems by artificial immune response , 2006 .
[24] Stephanie Forrest,et al. Immunity by design: an artificial immune system , 1999 .
[25] Tao Li,et al. An immunity based network security risk estimation , 2005, Science in China Series F: Information Sciences.
[26] Feixian Sun,et al. Immunity-Based Dynamic Anomaly Detection Method , 2008, 2008 2nd International Conference on Bioinformatics and Biomedical Engineering.
[27] Feixian Sun,et al. A New Risk Assessment Model for E-Government Network Security Based on Antibody Concentration , 2009, 2009 International Conference on E-Learning, E-Business, Enterprise Information Systems, and E-Government.
[28] Yu Zhang,et al. A Novel Biology-Inspired Virus Detection Model with RVNS , 2008, ISICA.
[29] Fei-xian Sun,et al. Immunity-Inspired Risk Assessment Approach for Network Security , 2009, 2009 International Conference on Web Information Systems and Mining.
[30] Peter Ross,et al. Improving SOSDM: Inspirations from the Danger Theory , 2003, ICARIS.
[31] Yiwen Liang,et al. A Novel Intrusion Detection Model Based on Danger Theory , 2008, 2008 IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial Application.
[32] Tao Li,et al. Dynamic detection for computer virus based on immune system , 2008, Science in China Series F: Information Sciences.
[33] Liu Nian. The Research of Network Intrusion Detection Based on Immune Danger Theory , 2006 .
[34] Tao Li,et al. An immune based dynamic intrusion detection model , 2005 .
[35] Feixian Sun,et al. A Gene Technology Inspired Paradigm for User Authentication , 2009, 2009 3rd International Conference on Bioinformatics and Biomedical Engineering.