Information Technology Reference
In-Depth Information
References
1. Jerne, N.K.: The immune system. J. Scientific American 229, 51-60 (1973)
2. Xiao, R.B., Wang, L.: Artificial Immune System: Principle, Models, Analysis and Perspec-
tives. J. Chinese J. Computers 25, 1281-1293 (2002) (in Chinese)
3. Forres, S., Perelson, A.S., Allen, L., et al.: Self-Nonself discrimination in a computer. In:
1994 IEEE Symp. on Research in Security and Privacy, pp. 120-128. IEEE Press, New
York (1994)
4. Kemmerer, R.A., Vigna, G.: Intrusion detection: a brief history and overview. J. IEEE
Computer 35, 27-30 (2002)
5. Jiang, J.C., Ma, H.T., Ren, D.E.: Intrusion Detection Network Security: A Survey. J. Jour-
nal of Software 11, 1460-1407 (2000) (in Chinese)
6. Seung, H.S., Lee, D.D.: The Manifold Ways of Perception. J. Sience 290, 2268-2269
(2000)
7. Patcha, A., Park, J.M.: Network anomaly detection with incomplete audit data. J. Com-
puter Networks 51, 3935-3955 (2007)
8. Fugate, M., Gattiker, J.R.: Anomaly detection enhanced classification in computer intru-
sion detection. In: Lee, S.-W., Verri, A. (eds.) SVM 2002. LNCS, vol. 2388, pp. 186-197.
Springer, Heidelberg (2002)
9. Kim, D.S., Park, J.S.: Network-Based intrusion detection with support vector machines. In:
Kahng, H.-K. (ed.) ICOIN 2003. LNCS, vol. 2662, pp. 747-756. Springer, Heidelberg
(2003)
10. Park, J.S., Shazzad, K.M., Kim, D.S.: Toward modeling lightweight intrusion detection
system through correlation-based hybrid feature selection. In: Feng, D., Lin, D., Yung, M.
(eds.) CISC 2005. LNCS, vol. 3822, pp. 279-289. Springer, Heidelberg (2005)
11. Carol, T., Jim, A.F.: NATE: Network analysis of anomalous traffic events, a low-cost ap-
proach. In: 2001 Workshop on New Security Paradigms, pp. 89-96. ACM Press, New
Mexico (2001)
12. Horng, S., Fan, P., Chou, Y., et al.: A feasible intrusion detector for recognizing IIS attacks
based on neural networks. J. Computers & Security 27, 1-17 (2008)
13. Zhang, C.Y., Cao, Y.D., Yang, M.H., et al.: The Immune Recognition Method Based on
Analogy Reasoning in IDS. J. Wuhai University Journal of Natural Sciences 11, 1839-
1843 (2006)
 
Search WWH ::




Custom Search