Biomedical Engineering Reference
In-Depth Information
3. Lippmann RP, Fried DJ, Graf I, Haines JW, Kendall KR, McClung D, Weber D, Webster SE,
Wyschogrod D, Cunningham RK, Zissman MA (2000) Evaluating intrusion detection systems:
the 1998 darpa off-line intrusion detection evaluation, discex, vol 02, pp 210-212
4. Dasgupta D (1999) Immunity-based intrusion detection system: a general framework. In:
Proceeding of the 22nd national information systems security conference (NISSC), Arlington,
Virgina, pp 147-160
5. Matzinger
P
(1994)
Tolerance,
danger
and
the
extended
family.
Ann
Rev
Immunol
12(2004):991-1045
6. Aickelin U, Cayzer S (2002) The danger theory and its application to AIS. In: 1st international
conference on AIS, 2002, pp 141-148
7. Chen G, Shuo P, Rong J, Chao L (2009) An anomaly detection system based on dendritic
cell algorithm. In: Third international conference on genetic and evolutionary computing,
pp 192-195
8. Kumari K, Prof. Jain A, Prof. Dongre S, Prof. Jain A (2012) Intrusion detection technique
based on dendritic cell algorithm and dempster belief theory. Int Organ Sci Res 1(5): 38-43
9. Shafer G (1976) A Mathematical theory of evidence. Princeton University Press, NJ
Search WWH ::




Custom Search