Information Technology Reference
In-Depth Information
References
1.
Aickelin, U. Bentley, P., Cayzer, S., Kim, J., and McLeod, J.: Danger Theory: the Link
between AIS and IDS. In Proc. of the 2
nd
Int. Conf. on AIS (ICARIS-03), (2003) 147-155.
2.
Akyildiz, I. F. et al.: A Survey on Sensor Networks, IEEE Communication Magazine,
Aug., (2002) 102-114.
3.
Bentley, P., Greensmith, J., and Ujjin, S. : Two ways to grow tissue for AIS, In Proc. of
the 3
rd
Int. Conf. on AIS (ICARIS-05), Springer-Verlag (2005) 139-152
4.
Estrin, D., Cullar, D., Pister, K., and Sukhatme, G. : Connecting the Physical World with
Pervasive Networks, Pervasive Computing
,
(2002) 59-69
5.
Greensmith, J., Aickelin, U. and Cayzer, S. : Introducing Dendritic Cells as a Novel
Immune-Inspired Algorithm for Intrusion Detection, In Proc. of ICARIS-05, Springer-
Verlag (2005) 153-167
6.
Greensmith, J., Twycross, J., and Aickelin, U.: Dendritic Cells for Anomaly Detection, In
Proc. of IEEE Cong. on Evolutionary Computation (CEC-06), Vancouver, Canada (2006).
7.
Greensmith, J. et al.: Articulation and Clarification of the Dendritic Cell Algorithm,
submitted to ICARIS-2006
8.
Hart, E., and Timmis, J. : Application Areas of AIS : The Past, The Present and The Future,
In Proc. of the 3
rd
Int. Conf. on AIS (ICARIS-05), (2005) 483-497
9.
Intanagonwiwat, C. et al : Directed Diffusion for Wireless Sensor Networking, IEEE/ACM
Trans. on Networking, Vol.11, No.1, Feb (2003) 2-16.
10.
Karlof, C., and Wagner, D. : Secure routing in wireless sensor networks: attacks and
countermeasures, Ad Hoc Networks, (2004) 293-315
11.
Kim, J., Wilson, W., Aickelin, U. and McLeod, J. : Cooperative Automated Worm
Response and Detection ImmuNe Algorithm (CARDINAL) inspired by T-cell Immunity
and Tolerance, In Proc. of the 3
rd
Int. Conf. on AIS (ICARIS-05), (2005) 168-181
12.
Kim, J. et al, Immune System Approaches to Intrusion Detection - a Review, under
review.
13.
Matzinger, P.: Tolerance, danger and the extended family. Annual Reviews in Immunology,
12 (1994) 991-1045
14.
Sarafijanovic, S. and Le Boudec, J. : An AIS for misbehaviour detection in mobile ad-hoc
networks with virtual thymus, clustering, danger signals and memory detectors, In Proc. of
the 2
rd
Int. Conf. on AIS (ICARIS-04), Springer-Verlag (2005) 342-356
15.
Twycross, J. and Aickelin, U. : Towards a conceptual framework for innate immunity, In
Proc. of the 3
rd
Int. Conf. on AIS (ICARIS-05), Springer-Verlag (2005) 153-167
16.
Twycross, J. and Aickelin, U.: libtissue - implementing innate immunity, In Proc. of the
CEC-06, Vancouver, Canada (2006) to appear.