Information Technology Reference
In-Depth Information
Esponda, F. Negative Representations of Information . Dissertation, h e University of
New Mexico, 2005.
Esponda, F., E. S. Ackley, P. Helman, H. Jia and S. Forrest. Protecting data privacy through
hard-to-reverse negative databases. In Katsikas S. K., Lopez J., Backes M., Gritzalis S.,
and Preneel B. (Eds), ISC , Volume 4176 of Lecture Notes in Computer Science , pp. 72-84,
Springer, 2006.
Esponda, F., E. S. Ackley, P. Helman, H. Jia and S. Forrest. Protecting Data Privacy
through Hard-to-Reverse Negative Databases. Int. J. Inform. Security (IJIS) , 6(6),
403-415, 2007a.
Esponda, F. and S. Forrest. Detector Coverage Under h e r-contiguous Bits Matching Rule ,
h e University of New Mexico, Albuquerque, NM, TR-CS-2002-03, 2002.
Esponda, F., S. Forrest and Helman P. h e crossover closure and partial match detection.
Proceedings of the 2nd International Conference on Artifi cial Immune Systems (ICARIS) ,
pp. 249-260, Edinburgh, U.K., 2003.
Esponda, F., S. Forrest and P. Helman. Enhancing Privacy through Negative Representations
of Data . UNM Computer Science Technical Report TR-CS-2004-18, March 2004.
Esponda, F., E. D. Trias, E. S. Ackley, and S. Forrest. A Relational Algebra for Negative
Databases . h e University of New Mexico, Computer Science Technical Report TR-
CS-2007-18, November 2007b.
Forrest, S., A. S. Perelson, L. Allen and R. Cherukuri. Self-nonself discrimination in a
computer. Proceedings of the 1994 IEEE Symposium on Research in Securit y and Privacy ,
IEEE Computer Society Press, Los Alamitos, CA, 1994.
Freitas, A. A. and J. Timmis. Revisiting the foundation of artifi cial immune systems:
A problem-oriented perspective. Proceedings of Second International Conference on
Artifi cial Immune System (ICARIS) , LNCS 2787, pp. 229-241, Springer, Edinburgh,
U.K., 2003.
González, F. A Study of Artifi cial Immune Systems Applied to Anomaly Detection . PhD.
Dissertation, h e University of Memphis, May 2003.
Gonzalez, F. and D. Dasgupta. An immunogenetic technique to detect anomalies in
network tra c. Proceedings of the Genetic and Evolutionary Computation Conference
(GECCO) , New York, July 9-13, 2002.
Gonzalez, F. A. and D. Dasgupta. Anomaly detection using real-valued negative selection.
Genet. Progr. Evol. Machines , 4, 383-403, 2003.
Gonzalez, F., D. Dasgupta and J. Gomez. h e eff ect of binary matching rules in negative
selection. Proceedings of the Genetic and Evolutionary Computation Conference (GECCO
2003) , LNCS 2723, pp. 195-206, Chicago, IL, July 2003a.
Gonzalez, F., D. Dasgupta and L. F. Nino. A randomized real-value negative selection
algorithm. Proceedings of Second International Conference on Artifi cial Immune System
(ICARIS 2003) , Edinburgh, U.K., September 2003b.
Hang, X. and H. Dai. Constructing Detectors in Schema Complementary Space for
Anomaly Detection, Lecture Notes in Computer Science , LNCS 3102, Proceedings of
Genetic and Evolutionary Computation Conference (GECCO 2004) , pp. 275-286,
Springer, Seattle, Washington, 2004.
Hofmeyr, S. A. An Immunological Model of Distributed Detection and its Application to
Computer Security . PhD thesis, h e University of New Mexico, 1999.
Hofmeyr, S. A. and S. Forrest. Architecture for an artifi cial immune system. Evol. Comput. ,
7(1), 45-68, 2000.
Search WWH ::




Custom Search