References
- Journal of Computer Security v.6 Intrusion detection using sequences of system calls S. Hofmeyr; S. Forrest;A. Somayaji
- Proc. of the IEEE Symposium on security and Privacy Detecting intrusions using system calls: Alternative data models C. Warrender;S. Forrest;B. Pearlmutter
- Proc. of the Genetic and Evolutionary Computation Conference (GECCO2000) Workshop Program An immune agent architecture for intrusion detection D. Dasgupta
- Proc. of the Genetic and Evolutionary Computation Conference (GECCO 2000) Workshop Program An immunity-based security layer model J. Gu;D. Lee;S. Park;K. Sim
- Proc. of the Global Telecommunication Conference (GLOBECOM 2000) An antibody layer for internet security J. Gu;D. Lee;K. Sim;S. Park
- Trans. on IEICE v.E83-B no.11 An immunity-based security layer against Internet antigens J. Gu;D. Lee;K. Sim;S. Park
- Proc. of the IEEE Symposium on Research in Security and Privacy Self-nonself discrimination in a computer S. Forrest;A.S. Perelson;L. Allen;R. Cherukuri
- Proc. of the Genetic and Evolutionary Computation Conference (GECCO 2000) Workshop Program An agent based architecture for a computer virus immune system P. Harmer;G. Lamont
- Immunology I. Roitt;J. Brostoff;D. Male
- Biology: The science of life R. A. Wallace;G. P. Sanders;R. J. Ferl
- Proc. of the New Security Paradigms Workshop Principles of a computer immune system A. Somayaji;S. Hofmeyr;S. Forrest
- Communications of the ACM v.40 no.10 Computer immunology S. Forrest;S. Hofmeyr;A. Somayaji https://doi.org/10.1145/262793.262811
- Proc. of the IEEE Symposium on Computer Security and Privacy An immunological approach to change detection: algorithms, analysis, and implications P. D'haeseleer;S. Forrest;P. Helman
- Artificial Immune Systems and Their Applications An anomaly detection algorithm inspired by the immune system D. Dasgupta;S. Forrest
- Proc. of 1st International Conference on Artificial Immune System Negative selection: how to generate detectors M. Ayara;J. Timmis;R. de Lemos;L. de Castro;R. Duncan
- Proc. of 1st International Conference on Artificial Immune System Anomaly detection using negative selection based on the r-contiguous matching rule S. Singh