Adaptation in natural and artificial systems
Adaptation in natural and artificial systems
Using Genetic Algorithms for Concept Learning
Machine Learning - Special issue on genetic algorithms
Hidden order: how adaptation builds complexity
Hidden order: how adaptation builds complexity
Genetic algorithms + data structures = evolution programs (3rd ed.)
Genetic algorithms + data structures = evolution programs (3rd ed.)
Coevolutionary search among adversaries
Coevolutionary search among adversaries
Principles of a computer immune system
NSPW '97 Proceedings of the 1997 workshop on New security paradigms
The ant colony optimization meta-heuristic
New ideas in optimization
Artficial Immune Systems and Their Applications
Artficial Immune Systems and Their Applications
Mimicry attacks on host-based intrusion detection systems
Proceedings of the 9th ACM conference on Computer and communications security
Coevolutionary Learning: A Case Study
ICML '98 Proceedings of the Fifteenth International Conference on Machine Learning
An Application of Machine Learning to Network Intrusion Detection
ACSAC '99 Proceedings of the 15th Annual Computer Security Applications Conference
A Sense of Self for Unix Processes
SP '96 Proceedings of the 1996 IEEE Symposium on Security and Privacy
A Network Worm Vaccine Architecture
WETICE '03 Proceedings of the Twelfth International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises
An analysis of cooperative coevolutionary algorithms
An analysis of cooperative coevolutionary algorithms
Resilient infrastructure for network security
Complexity - Special issue: Resilient and adaptive defense of computing networks
Aspects of adaptive reconfiguration in a scalable intrusion tolerant system
Complexity - Special issue: Resilient and adaptive defense of computing networks
Guest Editors' Introduction: Why Attacking Systems Is a Good Idea
IEEE Security and Privacy
On the effectiveness of address-space randomization
Proceedings of the 11th ACM conference on Computer and communications security
Snort - Lightweight Intrusion Detection for Networks
LISA '99 Proceedings of the 13th USENIX conference on System administration
Evolving computer intrusion scripts for vulnerability assessment and log analysis
GECCO '05 Proceedings of the 7th annual conference on Genetic and evolutionary computation
Architecture for an Artificial Immune System
Evolutionary Computation
Cooperative Coevolution: An Architecture for Evolving Coadapted Subcomponents
Evolutionary Computation
On evolving buffer overflow attacks using genetic programming
Proceedings of the 8th annual conference on Genetic and evolutionary computation
CEC '02 Proceedings of the Evolutionary Computation on 2002. CEC '02. Proceedings of the 2002 Congress - Volume 02
Intrusion detection using sequences of system calls
Journal of Computer Security
Classifier fitness based on accuracy
Evolutionary Computation
ICARIS'05 Proceedings of the 4th international conference on Artificial Immune Systems
Inducing oblique decision trees with evolutionary algorithms
IEEE Transactions on Evolutionary Computation
DARPA Information Assurance Program dynamic defense experiment summary
IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans
Proceedings of the 12th annual conference companion on Genetic and evolutionary computation
A hybrid network intrusion detection system using simplified swarm optimization (SSO)
Applied Soft Computing
Hi-index | 0.00 |
The pervasiveness of the computing power has made it an inevitable commodity of the modern time. The inexorable technological advances clearly predict the continually increasing reliance of human life on the computing systems in the future. Intelligent portable devices are commonplace these days and information accessibility is ubiquitous. There is a network underlying any computer infrastructure. Complex Adaptive Systems (CAS) are a relatively new field with techniques inspired by Biology, Sociology and other fields. The field of CAS studies systems as a network of interdependent components. There has been a major breakthrough in the field of Network Intrusion Detection Systems (NIDS) in computer security through the adoption of a CAS perspective. This paper surveys some key work in this area with the primary focus being placed on biologically-inspired CAS approaches to NIDS.