Survey Analysis on Immunological Approach to Intrusion Detection
暂无分享,去创建一个
[1] Lui Sha,et al. Memory Heat Map: Anomaly detection in real-time embedded systems using memory behavior , 2015, 2015 52nd ACM/EDAC/IEEE Design Automation Conference (DAC).
[2] Julie Greensmith,et al. Dendritic cells for SYN scan detection , 2007, GECCO '07.
[3] Julie Greensmith,et al. Immune system approaches to intrusion detection – a review , 2004, Natural Computing.
[4] Uwe Aickelin,et al. Danger Theory: The Link between AIS and IDS? , 2003, ICARIS.
[5] Feng Wang,et al. A Survey of Artificial Immune System Based Intrusion Detection , 2014, TheScientificWorldJournal.
[6] Sureswaran Ramadass,et al. Distributed Agent Based Model for Intrusion Detection System Based on Artificial Immune System , 2013 .
[7] Carlos García Garino,et al. Automatic network intrusion detection: Current techniques and open issues , 2012, Comput. Electr. Eng..
[8] Uwe Aickelin,et al. An Immune Inspired Approach to Anomaly Detection , 2009, ArXiv.
[9] Inadyuti Dutt,et al. Intrusion Detection System using Artificial Immune System , 2016 .
[10] Julie Greensmith,et al. Dendritic Cells for Real-Time Anomaly Detection , 2010, ArXiv.
[11] Chung-Ming Ou,et al. Host-based intrusion detection systems adapted from agent-based artificial immune systems , 2012, Neurocomputing.
[12] Tarek S. Sobh,et al. A cooperative immunological approach for detecting network anomaly , 2011, Appl. Soft Comput..
[13] Peter J. Bentley,et al. The Artificial Immune System for Network Intrusion Detection : An Investigation of Clonal Selection with a Negative Selection Operator , 2001 .
[14] Graham Kendall,et al. Search Methodologies: Introductory Tutorials in Optimization and Decision Support Techniques , 2013 .
[15] Sugata Sanyal,et al. A Multi-Dimensional approach towards Intrusion Detection System , 2012, ArXiv.
[16] Uwe Aickelin,et al. Detecting Anomalous Process Behaviour Using Second Generation Artificial Immune Systems , 2010, Int. J. Unconv. Comput..
[17] Senhua Yu,et al. MILA – multilevel immune learning algorithm and its application to anomaly detection , 2005, Soft Comput..
[18] Julie Greensmith,et al. Immune System Approaches to Intrusion Detection - A Review , 2004, ICARIS.