Author:
Aickelin Uwe,Greensmith Julie,Twycross Jamie
Publisher
Springer Berlin Heidelberg
Reference36 articles.
1. Aickelin, U., Bentley, P., Cayzer, S., Kim, J., McLeod, J.: Danger theory: The link between ais and ids. In: Proc. of the Second Internation Conference on Artificial Immune Systems (ICARIS 2003), pp. 147–155 (2003)
2. Balthrop, J., Esponda, F., Forrest, S., Glickman, M.: Coverage and generaliszation in an artificial immune system. In: Proceedings of GECCO, pp. 3–10 (2002)
3. Balthrop, J., Forrest, S., Glickman, M.: Revisiting lisys: Parameters and normal behaviour. In: Proceedings of the Congress on Evolutionary Computation, pp. 1045–1050 (2002)
4. Begnum, K., Burgess, M.: A scaled, immunological approach to anomaly countermeasures (combining ph with cfengine). In: Integrated Network Management, pp. 31–42 (2003)
5. Boudec, J., Sarafijanovic, S.: An artificial immune system approach to misbehavior detection in mobile ad-hoc networks. Technical Report IC/2003/59, Ecole Polytechnique Federale de Lausanne (2003)
Cited by
47 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Fuzzy optimized V-detector algorithm on Apache Spark for class imbalance issue of intrusion detection in big data;Neural Computing and Applications;2023-07-10
2. IoBT Intrusion Detection System using Machine Learning;2023 IEEE 13th Annual Computing and Communication Workshop and Conference (CCWC);2023-03-08
3. SoK;Proceedings of the 15th International Conference on Availability, Reliability and Security;2020-08-25
4. Artificial Immune Systems;Machine Learning Paradigms;2016-10-27
5. An Immune Clonal Selection Algorithm for Synthetic Signature Generation;Mathematical Problems in Engineering;2014