Information Technology Reference
In-Depth Information
González, F., J. Galeano, A. Veloza and A. Rojas. Discriminating and visualizing anomalies
using negative selection and self-organizing maps. Proceedings of the 2005 Conference
on Genetic and Evolutionary Computation (GECCO'05) , ACM Press, Washington,
pp. 297-304, June 25-29, 2005.
González, F., D. Dasgupta and R. Kozma. Combining negative selection and classifi ca-
tion techniques for anomaly detection. Proceedings of IEEE Congress on Evolutionary
Computation . Honolulu, Hawaii, vol. 1, pp. 705-710, May 2002.
Greensmith, J., U. Aickelin and J. Twycross. Articulation and clarifi cation of the dendritic
cell algorithm. ICARIS-06 , LNCS 4163, Oeiras, Portugal, pp. 404-417, 2006.
Hofmeyr, S., A. Somayaji and S. Forrest. Intrusion detection using sequences of system
calls. J. Comput. Security , 6, 151-180, 1998.
Hone, A. and H. van den Bergt. Modelling a cytokine network. Proceedings of the IEEE
Symposium on Foundations of Computational Intelligence (FOCI) , Honolulu, HI,
2007.
Janeway, C. A. h e immune system evolved to discriminated infectious nonself from non-
infectious self. Immunol. Today , 13, 11-16, 1992.
Laff erty, K. and A. Cunningham. A new analysis of allogeneic interactions. Aust. J. Exp.
Biol. Med. Sci. , 53, 27-42, 1975.
Matzinger, P. Tolerance, danger and the extended family. Annu. Rev. Immunol., 12, 991-1045,
1994.
Matzinger, P. h e danger model: A renewed sense of self. Science , 296, 301, 2002.
Matzinger, P. Friendly and dangerous signals: Is the tissue in control? Nat. Immunol. , 8(1),
11-13, 20 07.
Somayaji, A. Immunology, diversity, and homeostasis: h e past and future of biologically-
inspired computer defenses. Inf. Security Tech. Rep. , 12(4), 228-234, 2007.
Somayaji, A. and S. Forrest. Automated response using system-call delays. h e Proceedings
of the 9th USENIX Security Symposium , Denver, Colorado, August 14-17, 2000.
Twycross, J. Integrated innate and adaptive artifi cial immune systems applied to process
anomaly detection. PhD thesis, School of Computer Science, h e University of
Nottingham, 2007.
Twycross, J. and M. M. Williamson. Implementing and testing a virus throttle. Proceedings
of the 12th USENIX Security Symposium , Washington, D. C., pp. 285-294, 2003.
Warr, G. W. and N. Cohen. Phylogenesis of Immune Functions , CRC Press, Boca Raton,
FL, 1991.
Yeom, K.-W. Immune-inspired algorithm for anomaly detection. Stud. Comput. Intell.
(SCI) , 57, 129-154, 2007.
Search WWH ::




Custom Search