Information Technology Reference
In-Depth Information
References
1. Aickelin, U. Bentley, P., Cayzer, S., Kim, J., and McLeod, J.: Danger Theory: the Link
between AIS and IDS. In Proc. of the 2 nd Int. Conf. on AIS (ICARIS-03), (2003) 147-155.
2. Akyildiz, I. F. et al.: A Survey on Sensor Networks, IEEE Communication Magazine,
Aug., (2002) 102-114.
3. Bentley, P., Greensmith, J., and Ujjin, S. : Two ways to grow tissue for AIS, In Proc. of
the 3 rd Int. Conf. on AIS (ICARIS-05), Springer-Verlag (2005) 139-152
4. Estrin, D., Cullar, D., Pister, K., and Sukhatme, G. : Connecting the Physical World with
Pervasive Networks, Pervasive Computing , (2002) 59-69
5. Greensmith, J., Aickelin, U. and Cayzer, S. : Introducing Dendritic Cells as a Novel
Immune-Inspired Algorithm for Intrusion Detection, In Proc. of ICARIS-05, Springer-
Verlag (2005) 153-167
6. Greensmith, J., Twycross, J., and Aickelin, U.: Dendritic Cells for Anomaly Detection, In
Proc. of IEEE Cong. on Evolutionary Computation (CEC-06), Vancouver, Canada (2006).
7. Greensmith, J. et al.: Articulation and Clarification of the Dendritic Cell Algorithm,
submitted to ICARIS-2006
8. Hart, E., and Timmis, J. : Application Areas of AIS : The Past, The Present and The Future,
In Proc. of the 3 rd Int. Conf. on AIS (ICARIS-05), (2005) 483-497
9. Intanagonwiwat, C. et al : Directed Diffusion for Wireless Sensor Networking, IEEE/ACM
Trans. on Networking, Vol.11, No.1, Feb (2003) 2-16.
10. Karlof, C., and Wagner, D. : Secure routing in wireless sensor networks: attacks and
countermeasures, Ad Hoc Networks, (2004) 293-315
11. Kim, J., Wilson, W., Aickelin, U. and McLeod, J. : Cooperative Automated Worm
Response and Detection ImmuNe Algorithm (CARDINAL) inspired by T-cell Immunity
and Tolerance, In Proc. of the 3 rd Int. Conf. on AIS (ICARIS-05), (2005) 168-181
12. Kim, J. et al, Immune System Approaches to Intrusion Detection - a Review, under
review.
13. Matzinger, P.: Tolerance, danger and the extended family. Annual Reviews in Immunology,
12 (1994) 991-1045
14. Sarafijanovic, S. and Le Boudec, J. : An AIS for misbehaviour detection in mobile ad-hoc
networks with virtual thymus, clustering, danger signals and memory detectors, In Proc. of
the 2 rd Int. Conf. on AIS (ICARIS-04), Springer-Verlag (2005) 342-356
15. Twycross, J. and Aickelin, U. : Towards a conceptual framework for innate immunity, In
Proc. of the 3 rd Int. Conf. on AIS (ICARIS-05), Springer-Verlag (2005) 153-167
16. Twycross, J. and Aickelin, U.: libtissue - implementing innate immunity, In Proc. of the
CEC-06, Vancouver, Canada (2006) to appear.
 
Search WWH ::




Custom Search