共 115 条
[1]
Aickelin U., Greensmith J., Twycross J., Immune system approaches to intrusion detection - A review, Proceedings ICARIS-2004, 3rd International Conference on Artificial Immune Systems, pp. 316-329, (2004)
[2]
Aickelin U., Bentley P., Cayzer S., Kim J., McLeod J., Danger theory: The link between ais and ids, Proceedings of the Second International Conference on Artificial Immune Systems (ICARIS-03), pp. 147-155, (2003)
[3]
Aickelin U., Cayzer S., The danger theory and its application to ais, Proceeding of the First International Conference on Artificial Immune System (ICARIS-2002), pp. 141-148, (2002)
[4]
Axelsson S., Intrusion Detection Systems: A Survey and Taxonomy, (1999)
[5]
Ayara M., Timmis J., de Lemos R., de Castro L.N., Duncan R., Negative selection: How to generate detectors, Proceedings of the 1st International Conference on Artificial Immune Systems (ICARIS'-02), pp. 89-98, (2002)
[6]
Balthrop J., Personal Communication, (2004)
[7]
Balthrop J., Esponda F., Forrest S., Glickman M., Coverage and generalization in an artificial immune system, Proceedings of GECCO, pp. 3-10, (2002)
[8]
Balthrop J., Forrest S., Glickman M., Revisiting lisys: Parameters and normal behaviour, Proceedings of the Congress on Evolutionary Computation, pp. 1045-1050, (2002)
[9]
Begnum K., Burgess M., A scaled, immunological approach to anomaly countermeasures (combining ph with cfengine), Integrated Network Management, pp. 31-42, (2003)
[10]
Bentley P., Greensmith J., Ujin S., Two ways to grow tissue for artificial immune systems, Proceeding of the 4th International Conference on Artificial Immune Systems (ICARIS-2005), 3627, pp. 139-152, (2005)