Computer immunology

被引:414
作者
Forrest, S
Hofmeyr, SA
Somayaji, A
机构
[1] Department of Computer Science, University of New Mexico, Albuquerque, NM
关键词
D O I
10.1145/262793.262811
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Analogies with immunology represent an important step toward the vision of robust, distributed protection for computers.
引用
收藏
页码:88 / 96
页数:9
相关论文
共 12 条
  • [1] [Anonymous], 1988, COMPUT SECUR
  • [2] [Anonymous], 2001, The Immune System in Health and Disease
  • [3] Cohen F., 1987, Computers & Security, V6, P22, DOI 10.1016/0167-4048(87)90122-2
  • [4] DENNING DE, 1987, IEEE ENG, V2, P118
  • [5] An immunological approach to change detection: Algorithms, analysis and implications
    Dhaeseleer, P
    Forrest, S
    Helman, P
    [J]. 1996 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 1996, : 110 - 119
  • [6] Forrest S., 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy (Cat. No.94CH3444-7), P202, DOI 10.1109/RISP.1994.296580
  • [7] A sense of self for unix processes
    Forrest, S
    Hofmeyr, SA
    Somayaji, A
    Longstaff, TA
    [J]. 1996 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 1996, : 120 - 128
  • [8] Kephart J.O., 1995, P INT JOINT C ART
  • [9] COMPUTERS AND EPIDEMIOLOGY
    KEPHART, JO
    WHITE, SR
    CHESS, DM
    [J]. IEEE SPECTRUM, 1993, 30 (05) : 20 - 26
  • [10] Ko C., 1994, Proceedings. 10th Annual Computer Security Applications Conference (Cat. No.94TH8032), P134, DOI 10.1109/CSAC.1994.367313