References
- S. Hofmeyr, S. Forrest, and A Somayaji, "Intrusion Detection Using Sequences of System Calls." Journal of Computer Security vol. 6, pp. 151-180, 1998. https://doi.org/10.3233/JCS-980109
- C. Warrender, S. Forrest, B. Pearlmutter, "Detecting intrusions using system calls: Alternative data models," 1999 IEEE Symposium on security and Privacy (1999).
- D. Dasgupta, "An Immune Agent Architecture for Intrusion Detection.", Proceedings of The 2000 Genetic and Evolutionary Computation Conference (GECCO 2000) Workshop Program, pp. 42-44, 2000
- J. Gu, D. Lee, S. Park, and K. Sirn, "An Immunitybased Security Layer Model," Proceedings of The 2000 Genetic and Evolutionary Computation Conference (GECCO 2000) Workshop Program, pp. 47-48, 2000
- J. Gu, D. Lee, K. Sim, and S. Park, "An Antibody Layer for Internet Security," Proceedings of Global Telecommunication Conference(GLOBECOM 2000), pp. 450-454, 2000.
- J. Gu, D. Lee, K. Sim, and S. Park, "An Immunitybased Security Layer against Internet Antigens," Transactions on IEICE, vol. E83-B, no.11, pp. 2570-2575, 2000
- S. Forrest, A.S. Perelson, L. Alien, R. and Cherukuri, "Self-Nonself Discrimination in a Computer," In Proceedings of the 1994 IEEE Symposium on Research in Security and Privacy, Los Alamitos, CA: IEEE Computer Society Press, 1994.
- P. Harmer, and G. Lamont, "An Agent Based Architecture for a Computer Virus Immune System," Proceedings of The 2000 Genetic and Evolutionary Computation Conference(GECCO 2000) Workshop Program, pp. 45-46, 2000.
- I. Roitt, J. Brostoff, D. Male, Immunology, 4th edition, Mosby, 1996.
- R. A. Wallace, G. P. Sanders, and R. J. Ferl, BIOLOGY : The Science of Life, 3rd eds., HarperCollins Publishers Inc., 1991.
- A. Somayaji, S. Hofmeyr, and S. Forrest, "Principles of a Computer Immune System," 1997 New Security Paradigms Workshop pp. 75-82, 1998.
- "Computer Immunology." S. Forrest, S. Hofmeyr, and A. Somayaji. Communications of the ACM vol. 40, no. 10, pp. 88-96, 1997. https://doi.org/10.1145/262793.262811
- P. D'haeseleer, S. Forrest, and P. Helman, "An Immunological Approach to Change Detection: Algorithms, Analysis, and Implications,." In Proceedings of the 1996 IEEE Symposium on Computer Security and Privacy, 1996.
- D. Dasgupta, and S. Forrest, "An Anomaly Detection Algorithm Inspired by the Immune System." Artificial Immune Systems and Their Applications, Springer, pp. 262-276, 1999.
- D. Dasgupta and S. Forrest, "Novelty Detection in Time Series Data using Ideas from Immunology," In Proceedings of The International Conference on Intelligent Systems, 1999.
- D. Dasgupta and S. Forrest, "Artificial Immune Systems in Industrial Applications.", In International conference on Intelligent Processing and Manufacturing Material (IPMM), 1999.
- L. N. Castro, and F. J. Zuben, "The Clonal Selection Algorithm with Engineering Applications.", Proceedings of The 2000 Genetic and Evolutionary Computation Conference(GECCO.2000) Workshop. Program, pp. 36-37, 2000.
- K. Mori, K. Abe, M. Tsukiyama, and T. Fukuda, "Artificial Immune System based on Petri Nets and its Application to Production Management System. " , Proceedings of The 2000 Genetic and Evolutionary Computation Conference( GECCO 2000) Workshop Program, pp. 51-52, 2000.
- M. Kawagoe and A. Tojo, "Fingerprint Pattern Classification," Pattern Recognition, vol. 17, no. 3, pp.295-303, 1984. https://doi.org/10.1016/0031-3203(84)90079-7
- L. O'Gorman, and J. V. Nickerson, "An approach to fingerprint filter design," Pattern Recognition, vol. 22, no. 1, pp. 29-38, 1989. https://doi.org/10.1016/0031-3203(89)90035-6
- P. Baldi, and Y. Chauvin, "Neural Networks for Fingerprint Recognition," Neural Computation, vol. 5, pp. 402-418, 1993. https://doi.org/10.1162/neco.1993.5.3.402
- B. M. Mehtre, "Fingerprint Image Analysis for Automatic Identification," Machine Vision and Applications, vol. 6, no. 2-3, 1993.