An artificial immune system architecture for computer security applications
Tóm tắt
Từ khóa
Tài liệu tham khảo
kumar, 1994, Introduction to Parallel Computing Design and Analysis of Algorithms
marmelstein, 1999, A white paper on modeling and analysis of computer immune systems using evolutionary algorithms
nadler, 1993, Pattern Recognition Engineering
tou, 1974, Pattern Recognition Principles
kephart, 1994, a biologically inspired immune system for computers, Proc Fourth Int Workshop Synthesis and Simulation of Living Systems, 130
hofmeyr, 1999, An immunological model of distributed detection and its application to computer security
1999, A compendium of NP optimization problems
williams, 2001, Warthog Toward an artificial immune system for detecting ‘ low and slow’ information system attacks
harmer, 2000, A distributed agent architecture for a computer virus immune system
skardhamar, 1996, Virus Detection and Elimination
cohen, 1994, A Short Course on Computer Viruses
cult of the dead cow, 1999, Back Orifice 2000
ludwig, 1996, The Little Black Book of Computer Viruses
hoffman, 1990, Rogue Programs Viruses Worms and Trojan Horses
cardinale, 1999, A constructive induction approach to computer immunology
symantec, 2001, Symantec Security Response— W32 Nimda A mm
sycara, 1998, multiagent systems, AI Mag, 19, 79
kephart, 1997, blueprint for a computer immune system, Proceedings of the Virus Bulletin International Conference
deloach, 1999, Using agentMOM
hofmeyr, 1999, immunity by design: an artificial immune system, Proceedings of the Genetic and Evolutionary Computation Conference, 1289
dasgupta, 1999, immunity-based intrusion detection systems: a general framework, 22nd Nat Information Systems Security Conf
mori, 1996, multi-optimization by immune algorithm with diversity and learning, Proc Second Int Conf Multiagent Systems, 118
her majesty s office of information, 1996, Antibodies teach computers to learn
hunt, 0, The ISYS Project An Introduction
deloach, 1999, multiagent systems engineering: a methodology and language for designing agent systems, Proc Int Bi-Conf Workshop Agent-Oriented Information Systems, 45
leon, 2000, internet virus boom, Infoworld, 22, 36
symantec, 2001, Symantec Security Response— Definitions Added
lamont, 1999, a distributed architecture for a self-adaptive computer virus immune system, New Ideas in Optimization, 167
williams, 2001, cdis: toward a computer immune system for detecting network intrusions, Proc Fourth Int Symp Recent Advances in Intrusion Detection, 117, 10.1007/3-540-45474-8_8
benjamini, 1996, Immunology A Short Course
kephart, 1994, automatic extraction of computer virus signatures, Proceedings of the 4th Virus Bulletin International Conference, 179
jain, 1991, The Art of Computer Systems Performance Analysis
2000, Nessus Ver 1 0 5
tally s virii link reference, 1999, Tally s virus collection statistics
burridge, 1999, Java Shared Data Toolkit User Guide Version 1 5
cunningham, 1999, evaluating intrusion detection systems without attacking your friends: the 1998 darpa intrusion detection evaluation, Third Conf and Workshop on Intrusion Detection and Response
ducklin, 1999, Standard anti-virus test file