Information Technology Reference
In-Depth Information
Dasgupta, D. and S. Forrest. An anomaly detection algorithm inspired by the immune sys-
tem.
Artifi cial Immune Systems and h eir Applications
, Springer, Berlin, pp. 262-277,
1999a.
Dasgupta, D. and S. Forrest.
New Ideas in Optimization
,
McGraw-Hill, New York, 1999b.
Dasgupta, D. and F. Gonzalez. An immunity-based technique to characterize intrusion in
computer networks.
IEEE Trans. Evol. Compt.,
6(3), 1081-1088, 2002.
Dasgupta, D., K. KrishnaKumar, D. Wong and M. Berry. Negative selection algorithm for
aircraft fault detection.
h e Proceedings of the h ird International Conference, ICARIS
2004 on Artifi cial Immune Systems
, Catania, Sicily, September 2004.
Dasgupta, D., S. Yu and N. S. Majumdar. MILA—multilevel immune learning algorithm.
Proceedings of the Genetic and Evolutionary Computation Conference (GECCO 2003)
,
LNCS 2723, Springer, Chicago, IL, July 12-16, pp. 183-194, 2003.
D'haeseleer, P., S. Forrest and P. Helman. An immunological approach to change detec-
tion: Algorithms, analysis, and implications.
Proceedings of the 1996 IEEE Symposium
on Computer Security and Privacy
, IEEE Computer Society Press, Los Alamitos, CA,
pp. 110 -119, 1996.
Endoh, S., N. Tom and K. Yamada. Immune algorithm for n-tsp.
Proceedings of IEEE
International Conference on Systems and Man and Cybernetics (SMC)
. IEEE, San
Diego, CA, pp. 3844-3849, 1998.
Forrest, S., S. Hofmeyr and A. Somayaji. Computer immunology.
Commn. ACM
, 40(10),
88-96, 1997.
Forrest, S., S. A. Hofmeyr, A. Somayaji and T. A. Longstaff . A sense of self for Unix
processes.
Proceedings of 1996 IEEE Symposium on Computer Security and Privacy
,
Oakland, CA, 1996.
Forrest, S., A. S. Perelson, L. Allen, and R. Cherukuri. Self-nonself discrimination in a
computer.
Proceedings of the 1994 IEEE Symposium on Research in Security and Pri-
vacy
, IEEE Computer Society Press, Los Alamitos, CA, 1994.
Fukuda, T., K. Mori and M. Tsukiyama. Parallel search for multimodal function opti-
mization with diversity and learning of immune algorithm, In D. Dasgupta (Ed.),
Artifi cial Immune Systems and h eir Applications
, Springer, Berlin, pp. 210-219,
1999.
González, F. An immunity-based technique to characterize intrusions in computer net-
works.
IEEE Trans. Evol. Compt.
, 6(3), 281-291, 2002.
González, F., D. Dasgupta and R. Kozma. Combining negative selection and classifi cation
techniques for anomaly detection.
Proceedings of the 2002 Congress on Evolutionary
Computation CEC2002
, D. B. Fogel, M. A. El-Sharkawi, X. Yao, G. Greenwood,
H. Iba, P. Marrow and M. Shackleton, (Eds.), IEEE Press, Honolulu, HI, pp. 705-710,
May 2002.
Gonzalez, F., D. Dasgupta and L. F. Nino. A randomized real-valued negative selection
algorithm.
h e Proceedings of the Second International Conference, ICARIS 2003 on
Artifi cial Immune Systems
, Edinburgh, September 2003.
Greensmith, J., U. Aickelin and J. Twycross. Articulation and clarifi cation of the dendritic
cell algorithm.
ICARIS-06
, LNCS 4163, Oeiras, Portugal, pp. 404-417, 2006.
Guzella, T. S., T. A. Mota-Santos and W. M. Caminhas. A novel immune inspired approach
to fault detection.
Lecture Notes in Computer Science, Proceedings of ICARIS 2007
,
Springer, Santos, 2007.
Search WWH ::
Custom Search