Information Technology Reference
In-Depth Information
Esponda, F.
Negative Representations of Information
. Dissertation, h e University of
New Mexico, 2005.
Esponda, F., E. S. Ackley, P. Helman, H. Jia and S. Forrest. Protecting data privacy through
hard-to-reverse negative databases. In Katsikas S. K., Lopez J., Backes M., Gritzalis S.,
and Preneel B. (Eds),
ISC , Volume 4176 of Lecture Notes in Computer Science
, pp. 72-84,
Springer, 2006.
Esponda, F., E. S. Ackley, P. Helman, H. Jia and S. Forrest. Protecting Data Privacy
through Hard-to-Reverse Negative Databases.
Int. J. Inform. Security (IJIS)
, 6(6),
403-415, 2007a.
Esponda, F. and S. Forrest.
Detector Coverage Under h e r-contiguous Bits Matching Rule
,
h e University of New Mexico, Albuquerque, NM, TR-CS-2002-03, 2002.
Esponda, F., S. Forrest and Helman P. h e crossover closure and partial match detection.
Proceedings of the 2nd International Conference on Artifi cial Immune Systems (ICARIS)
,
pp. 249-260, Edinburgh, U.K., 2003.
Esponda, F., S. Forrest and P. Helman.
Enhancing Privacy through Negative Representations
of Data
. UNM Computer Science Technical Report TR-CS-2004-18, March 2004.
Esponda, F., E. D. Trias, E. S. Ackley, and S. Forrest.
A Relational Algebra for Negative
Databases
. h e University of New Mexico, Computer Science Technical Report TR-
CS-2007-18, November 2007b.
Forrest, S., A. S. Perelson, L. Allen and R. Cherukuri. Self-nonself discrimination in a
computer.
Proceedings of the 1994 IEEE Symposium on Research in Securit y and Privacy
,
IEEE Computer Society Press, Los Alamitos, CA, 1994.
Freitas, A. A. and J. Timmis. Revisiting the foundation of artifi cial immune systems:
A problem-oriented perspective.
Proceedings of Second International Conference on
Artifi cial Immune System (ICARIS)
, LNCS 2787, pp. 229-241, Springer, Edinburgh,
U.K., 2003.
González, F.
A Study of Artifi cial Immune Systems Applied to Anomaly Detection
. PhD.
Dissertation, h e University of Memphis, May 2003.
Gonzalez, F. and D. Dasgupta. An immunogenetic technique to detect anomalies in
network tra
c.
Proceedings of the Genetic and Evolutionary Computation Conference
(GECCO)
, New York, July 9-13, 2002.
Gonzalez, F. A. and D. Dasgupta. Anomaly detection using real-valued negative selection.
Genet. Progr. Evol. Machines
, 4, 383-403, 2003.
Gonzalez, F., D. Dasgupta and J. Gomez. h e eff ect of binary matching rules in negative
selection.
Proceedings of the Genetic and Evolutionary Computation Conference (GECCO
2003)
, LNCS 2723, pp. 195-206, Chicago, IL, July 2003a.
Gonzalez, F., D. Dasgupta and L. F. Nino. A randomized real-value negative selection
algorithm.
Proceedings of Second International Conference on Artifi cial Immune System
(ICARIS 2003)
, Edinburgh, U.K., September 2003b.
Hang, X. and H. Dai.
Constructing Detectors in Schema Complementary Space for
Anomaly Detection,
Lecture Notes in Computer Science
, LNCS 3102,
Proceedings of
Genetic and Evolutionary Computation Conference (GECCO 2004)
, pp. 275-286,
Springer, Seattle, Washington, 2004.
Hofmeyr, S. A.
An Immunological Model of Distributed Detection and its Application to
Computer Security
. PhD thesis, h e University of New Mexico, 1999.
Hofmeyr, S. A. and S. Forrest. Architecture for an artifi cial immune system.
Evol. Comput.
,
7(1), 45-68, 2000.
Search WWH ::
Custom Search