Biomedical Engineering Reference
In-Depth Information
novel implementation aspects including a novel genotype allowing the evolution
of clusters together with the evolution of detectors and a fitness function which
evaluates at the phenotype level.
References
1. Cho SB (2003) Chapter 2: Artificial Life Technology for Adaptive Information Processing.
In: Nikola K Fuzziness and soft computing. Future directions for intelligent systems and
information sciences: the future of speech and image technologies, brain computers, WWW,
and bioinformatics, 13.33, vol 45. Heidelberg, Germany: Physica, ISBN 3-7908-1276-5.
2. Dasgupta D (1999) Immunity-based intrusion detection system: a general framework. In:
Proceedings of the 22nd national information systems security conference (NISSC). National
Institute of Standards and Technology and National Computer Security Center, Hyatt
Regency, Crystal City, Virginia, United States
3. Guan Y, Ghorbani AA, Belacel N (2003) Y-means: a clustering method for intrusion
detection. In: Canadian conference on electrical and computer engineering, Montreal, Qubec,
Canada, pp 1-4
4. Banfield JD, Raftery AE. Model-based gaussian and non-gaussian clustering
5. Kim J, Bentley P (1999a) The Human ImmuneSystem and Network Intrusion Detection, 7th
European Conference on Intelligent Techniques and Soft Computing (EUFIT '99), Aachen,
Germany
6. Dasgupta D, Cao Y, Yang C (2003) An immunogenetic approach to spectra recognition. In:
Wolfgang B, Jason D, Agoston EE, Max HG, Vasant H, Mark J, Robert ES (eds) Proceedings
of
the
genetic
and
evolutionary
computation
(GECCO)
Conference,
vol
1.
Morgan
Kaufmann, Orlando, p 149, 155, ISBN 1-55860-611-4
7. Kim J, Bentley P (1999b) The Artificial ImmuneModel for Network Intrusion Detection, 7th
European Conference on Intelligent Techniques and Soft Computing (EUFIT99), Aachen,
Germany
8. FAQ:
network
intrusion
detection
systems,
Version
0.8.3,
March
21,
2000
(Intrusion
Detection)
9. Timmis J, Andrews P, Owens N Clark E (2008) An interdisciplinary perspective on artificial
immune systems. Evolutionary Intelligence 1(1):5-26
10. Leonid P (2000) Intrusion detection with unlabeled data using clustering. Undergraduate
thesis, Columbia University, NY
11. Lane T, Brodley CE (1999) Temporal sequence learning and data reduction for anomaly
detection. ACM Trans Inf Syst Secur 2(3):295-331
12. Debar H, Dacier M, Wespi A (1999) Towards a taxonomy of intrusion-detection systems.
Computer Networks 31:805-822
13. Richard C (1999) A learning, multi-layered, hardware artificial immune system. Genetic and
Evolutionary Computation Conference 13:149-158
14. Spafford,
Zamboni
D
(2002)
Intrusion
detection
using
autonomous
agents
detection.
J Computer Security 10(1/2):23-70
15. Balasubramaniyan et al (1998) An Architecture For Intrusion Detection Using Autonomous
Agents, Technical Report 98/05, coast laboratory—Purdue university
16. Michael Sobirey's intrusion detection systems http://www.rnks.informatik.tucot
17. Fan W, Lee W, Stolfo S, Miller M (2000) A multiple model cost sensitive approach for
intrusion detection. In: 11th European conference on machine learning (ECML '00) 2000
18. Fan W, Miller M, Stolfo S, Lee W, Chan P (2001) Using artificial anomalies to detect
unknown and known network intrusions, CA
19. Kohonen Teuvo (1997) Self-organizing map. Springer, New York
Search WWH ::




Custom Search