Biomedical Engineering Reference
In-Depth Information
References
1. Matzinger P (1998) An Innate sense of danger, Seminars in Immunology, pp 399-415
2. Matzinger P (2001) The danger model in its historical context. Scand J Immunol 54:4-9
3. Matzinger P (1994) Tolerance danger and the extended family. Annu Rev Immunol 12:991-
1045
4. Burgess M (1998) Computer Immunology. Proc LISA XII:283-297
5. Williamson M (2002) Biologically inspired approaches to computer security, HP labs
technical reports HPL-2002, pp 131
6. Somayaji A, Hofmeyr S, Forrest S (1998) Principles of a computer immune system. In:
Proceedings New Security Paradigms Workshop, Charlottesville, pp 75-82
7. Aickelin U, Cayzer S (2002) The danger theory and its application to artificial immune
systems. In: Proceedings of the 1st internet conference on artificial immune systems.
ICARIS, Springer, pp 141-148
8. Aickelin U, Bentley P, Cayzer S, Kim J, McLeod J (2003) Danger theory: the link between
AIS and IDS? In: Proceedings ICARIS-2003, 2nd international conference on artificial
immune systems. ICARIS, Springer, pp 147-155
9. Goldsby R, Kindt T, Osborne B (2000) Kuby immunology, 4th edn. W H Freeman, New
York
10. Bretscher P, Cohn M (1970) A theory of self-nonself discrimination. Science 169:1042-1049
11. Matzinger P (1994) Tolerance, danger and the extended family. Annu Rev Immunol 12:991-
1045
12. Sundaram A (1996) An introduction to intrusion detection, crossroads: the ACM student
magazine 2(4)
13. Forrest S, Perelson A, Allen L, Cherukuri R (1994) Self non-self discrimination in a
computer. In: Proceedings of the 1994 IEEE symposium on research in security and privacy,
pp 202-212
14. Forrest S, Hofmeyr S, Somayaji A, Longstaff T (1996) A sense of self for unix processes. In:
Proceedings of the 1996 IEEE symposium on research in security and privacy, pp 120-128
15. Hofmeyr S, Forrest S (2000) Architecture for an artificial immune system. Evolutionary
Computation 8(4):443-473
16. Somayaji A, Forrest S (2000) Automated response using system-call delays. In: Proceedings
of the ninth USENIX security symposium, pp 185-197
Search WWH ::




Custom Search