Negative Authentication Systems
暂无分享,去创建一个
[1] Stephanie Forrest,et al. Architecture for an Artificial Immune System , 2000, Evolutionary Computation.
[2] Joseph Bonneau,et al. Guessing human-chosen secrets , 2012 .
[3] Stuart E. Schechter,et al. Popularity Is Everything: A New Approach to Protecting Passwords from Statistical-Guessing Attacks , 2010, HotSec.
[4] Dipankar Dasgupta,et al. Password Security through Negative Filtering , 2010, 2010 International Conference on Emerging Security Technologies.
[5] Paul Helman,et al. Protecting data privacy through hard-to-reverse negative databases , 2006, International Journal of Information Security.
[6] Dipankar Dasgupta,et al. An Anomaly Entection Algorithm Inspired by the Immune Syste , 1999 .
[7] Zhou Ji,et al. Negative selection algorithms: from the thymus to v-detector , 2006 .
[8] Pentti Kanerva,et al. Sparse Distributed Memory , 1988 .
[9] Zhou Ji,et al. Artificial immune system (AIS) research in the last five years , 2003, The 2003 Congress on Evolutionary Computation, 2003. CEC '03..
[10] N. Metropolis,et al. The Monte Carlo method. , 1949 .
[11] Eric Perkins,et al. A contact algorithm for partitioning N arbitrary sized objects , 2004 .
[12] Jonathan Timmis,et al. Artificial Immune Systems: A New Computational Intelligence Approach , 2003 .
[13] John R. Williams,et al. G-NAS: A grid-based approach for negative authentication , 2014, 2014 IEEE Symposium on Computational Intelligence in Cyber Security (CICS).
[14] Alan S. Perelson,et al. Self-nonself discrimination in a computer , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.
[15] Dipankar Dasgupta,et al. A biologically inspired password authentication system , 2009, CSIIRW '09.
[16] Zhou Ji,et al. V-detector: An efficient negative selection algorithm with "probably adequate" detector coverage , 2009, Inf. Sci..