Information Technology Reference
In-Depth Information
Dasgupta, D. and S. Forrest. An anomaly detection algorithm inspired by the immune sys-
tem. Artifi cial Immune Systems and h eir Applications , Springer, Berlin, pp. 262-277,
1999a.
Dasgupta, D. and S. Forrest. New Ideas in Optimization , McGraw-Hill, New York, 1999b.
Dasgupta, D. and F. Gonzalez. An immunity-based technique to characterize intrusion in
computer networks. IEEE Trans. Evol. Compt., 6(3), 1081-1088, 2002.
Dasgupta, D., K. KrishnaKumar, D. Wong and M. Berry. Negative selection algorithm for
aircraft fault detection. h e Proceedings of the h ird International Conference, ICARIS
2004 on Artifi cial Immune Systems , Catania, Sicily, September 2004.
Dasgupta, D., S. Yu and N. S. Majumdar. MILA—multilevel immune learning algorithm.
Proceedings of the Genetic and Evolutionary Computation Conference (GECCO 2003) ,
LNCS 2723, Springer, Chicago, IL, July 12-16, pp. 183-194, 2003.
D'haeseleer, P., S. Forrest and P. Helman. An immunological approach to change detec-
tion: Algorithms, analysis, and implications. Proceedings of the 1996 IEEE Symposium
on Computer Security and Privacy , IEEE Computer Society Press, Los Alamitos, CA,
pp. 110 -119, 1996.
Endoh, S., N. Tom and K. Yamada. Immune algorithm for n-tsp. Proceedings of IEEE
International Conference on Systems and Man and Cybernetics (SMC) . IEEE, San
Diego, CA, pp. 3844-3849, 1998.
Forrest, S., S. Hofmeyr and A. Somayaji. Computer immunology. Commn. ACM , 40(10),
88-96, 1997.
Forrest, S., S. A. Hofmeyr, A. Somayaji and T. A. Longstaff . A sense of self for Unix
processes. Proceedings of 1996 IEEE Symposium on Computer Security and Privacy ,
Oakland, CA, 1996.
Forrest, S., A. S. Perelson, L. Allen, and R. Cherukuri. Self-nonself discrimination in a
computer. Proceedings of the 1994 IEEE Symposium on Research in Security and Pri-
vacy , IEEE Computer Society Press, Los Alamitos, CA, 1994.
Fukuda, T., K. Mori and M. Tsukiyama. Parallel search for multimodal function opti-
mization with diversity and learning of immune algorithm, In D. Dasgupta (Ed.),
Artifi cial Immune Systems and h eir Applications , Springer, Berlin, pp. 210-219,
1999.
González, F. An immunity-based technique to characterize intrusions in computer net-
works. IEEE Trans. Evol. Compt. , 6(3), 281-291, 2002.
González, F., D. Dasgupta and R. Kozma. Combining negative selection and classifi cation
techniques for anomaly detection. Proceedings of the 2002 Congress on Evolutionary
Computation CEC2002 , D. B. Fogel, M. A. El-Sharkawi, X. Yao, G. Greenwood,
H. Iba, P. Marrow and M. Shackleton, (Eds.), IEEE Press, Honolulu, HI, pp. 705-710,
May 2002.
Gonzalez, F., D. Dasgupta and L. F. Nino. A randomized real-valued negative selection
algorithm. h e Proceedings of the Second International Conference, ICARIS 2003 on
Artifi cial Immune Systems , Edinburgh, September 2003.
Greensmith, J., U. Aickelin and J. Twycross. Articulation and clarifi cation of the dendritic
cell algorithm. ICARIS-06 , LNCS 4163, Oeiras, Portugal, pp. 404-417, 2006.
Guzella, T. S., T. A. Mota-Santos and W. M. Caminhas. A novel immune inspired approach
to fault detection. Lecture Notes in Computer Science, Proceedings of ICARIS 2007 ,
Springer, Santos, 2007.
Search WWH ::




Custom Search