Author:
Greensmith Julie,Aickelin Uwe,Cayzer Steve
Publisher
Springer Berlin Heidelberg
Reference17 articles.
1. Lecture Notes in Computer Science;U. Aickelin,2003
2. Aickelin, U., Cayzer, S.: Danger theory and its applications to ais. In: Proc. of the Second Internation Conference on Artificial Immune Systems (ICARIS 2002), pp. 141–148 (2002)
3. Aickelin, U., Greensmith, J., Twycross, J.: Immune system approaches to intrusion detection - a review. In: Proc. of the Second Internation Conference on Artificial Immune Systems (ICARIS 2003), pp. 316–329 (2004)
4. Eskin, E., Miller, M., Zhong, Z., Yi, G., Lee, W., Stolfo, S.: Adaptive model generation for intrusion detection. In: Proceedings of the ACMCCS Workshop on Intrusion Detection and Prevention, Athens, Greece (2000)
5. Germain, R.N.: An innately interesting decade of research in immunology. Nature Medicine 10(12), 1307–1320 (2004)
Cited by
124 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献