Behavioral Modeling Intrusion Detection System (BMIDS) Using Internet of Things (IoT) Behavior-Based Anomaly Detection via Immunity-Inspired Algorithms
暂无分享,去创建一个
Albert C. Esterline | Rahmira Rufus | Briana Arrington | LiEsa Barnett | A. Esterline | B. Arrington | LiEsa Barnett | Rahmira Rufus
[1] Stephanie Forrest,et al. Architecture for an Artificial Immune System , 2000, Evolutionary Computation.
[2] Albert C. Esterline,et al. An Autonomic Computing System based on a Rule-based Policy Engine and Artificial Immune Systems , 2016, MAICS.
[3] Paul A. Fishwick,et al. An introduction to OpenSimulator and virtual environment agent-based M&S applications , 2009, Proceedings of the 2009 Winter Simulation Conference (WSC).
[4] Zhou Cheng,et al. Overview of the Internet of Things , 2011 .
[5] Luming Tan,et al. Future internet: The Internet of Things , 2010, 2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE).
[6] Chen Jun,et al. Design of Complex Event-Processing IDS in Internet of Things , 2014, 2014 Sixth International Conference on Measuring Technology and Mechatronics Automation.
[7] R. Abelson. Psychological status of the script concept. , 1981 .
[8] Jyotsna P. Gabhane,et al. A survey based on Smart Homes system using Internet-of-Things , 2015, 2015 International Conference on Computation of Power, Energy, Information and Communication (ICCPEIC).
[9] Peter J. Bentley,et al. Towards an artificial immune system for network intrusion detection: an investigation of clonal selection with a negative selection operator , 2001, Proceedings of the 2001 Congress on Evolutionary Computation (IEEE Cat. No.01TH8546).
[10] A. Engelbrecht. Computational Intelligence: An Introduction, Second Edition , 2007 .
[11] J. Gibson. The Ecological Approach to Visual Perception , 1979 .