Intrusion detection systems and multisensor data fusion
Communications of the ACM
Mitigating routing misbehavior in mobile ad hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Verisim: Formal Analysis of Network Simulations
IEEE Transactions on Software Engineering
Performance analysis of the CONFIDANT protocol
Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing
Survivable mobile wireless networks: issues, challenges, and research directions
WiSE '02 Proceedings of the 1st ACM workshop on Wireless security
SPINS: security protocols for sensor networks
Wireless Networks
Internet intrusions: global characteristics and prevalence
SIGMETRICS '03 Proceedings of the 2003 ACM SIGMETRICS international conference on Measurement and modeling of computer systems
Ad-hoc On-Demand Distance Vector Routing
WMCSA '99 Proceedings of the Second IEEE Workshop on Mobile Computer Systems and Applications
An Immunological Approach to Change Detection: Algorithms, Analysis and Implications
SP '96 Proceedings of the 1996 IEEE Symposium on Security and Privacy
Intrusion detection techniques for mobile wireless networks
Wireless Networks
Medium access control in wireless sensor networks
Wireless sensor networks
Distributed fault detection of wireless sensor networks
DIWANS '06 Proceedings of the 2006 workshop on Dependability issues in wireless ad hoc networks and sensor networks
Fundamentals of Natural Computing (Chapman & Hall/Crc Computer and Information Sciences)
Fundamentals of Natural Computing (Chapman & Hall/Crc Computer and Information Sciences)
ARTIFICIAL IMMUNE SYSTEMS IN THE CONTEXT OF MISBEHAVIOR DETECTION
Cybernetics and Systems
BeeAIS: artificial immune system security for nature inspired, MANET routing protocol, BeeADHoc
ICARIS'07 Proceedings of the 6th international conference on Artificial immune systems
An artificial immune system architecture for computer securityapplications
IEEE Transactions on Evolutionary Computation
Wormhole attacks in wireless networks
IEEE Journal on Selected Areas in Communications
ICARIS'11 Proceedings of the 10th international conference on Artificial immune systems
Hi-index | 0.00 |
We present and discuss the AIS Library (AIS-Lib) that extends the Jist/SWANS network simulation platform. It implements basic features of artificial immune systems (AIS). AIS are one of the most recent approaches in computational intelligence, inspired by the efficiency of the human immune system.