IEEE Transactions on Software Engineering - Special issue on computer security and privacy
Computer viruses: theory and experiments
Computers and Security
The application of epidemiology to computer viruses
Computers and Security
IEEE Spectrum
Self-Nonself Discrimination in a Computer
SP '94 Proceedings of the 1994 IEEE Symposium on Security and Privacy
An Immunological Approach to Change Detection: Algorithms, Analysis and Implications
SP '96 Proceedings of the 1996 IEEE Symposium on Security and Privacy
A Sense of Self for Unix Processes
SP '96 Proceedings of the 1996 IEEE Symposium on Security and Privacy
Biologically inspired defenses against computer viruses
IJCAI'95 Proceedings of the 14th international joint conference on Artificial intelligence - Volume 1
Intrusion detection for distributed applications
Communications of the ACM
A high-performance network intrusion detection system
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
Characterizing the behavior of a program using multiple-length N-grams
Proceedings of the 2000 workshop on New security paradigms
A process control approach to cyber attack detection
Communications of the ACM
Anomaly Detection in Embedded Systems
IEEE Transactions on Computers - Special issue on fault-tolerant embedded systems
ACM Transactions on Computer Systems (TOCS)
NATE: Network Analysis of Anomalous Traffic Events, a low-cost approach
Proceedings of the 2001 workshop on New security paradigms
Neutralizing windows-based malicious mobile code
Proceedings of the 2002 ACM symposium on Applied computing
An efficient software protection scheme
Sec '01 Proceedings of the 16th international conference on Information security: Trusted information: the new decade challenge
Security of runtime extensible virtual environments
Proceedings of the 4th international conference on Collaborative virtual environments
Automated discovery of concise predictive rules for intrusion detection
Journal of Systems and Software
Specification-based anomaly detection: a new approach for detecting network intrusions
Proceedings of the 9th ACM conference on Computer and communications security
Multivariate Statistical Analysis of Audit Trails for Host-Based Intrusion Detection
IEEE Transactions on Computers
Novel Approaches in Dependable Computing
EDCC-4 Proceedings of the 4th European Dependable Computing Conference on Dependable Computing
Two Dimensional Time-Series for Anomaly Detection and Regulation in Adaptive Systems
DSOM '02 Proceedings of the 13th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management: Management Technologies for E-Commerce and E-Business Applications
Immunotronics: Hardware Fault Tolerance Inspired by the Immune System
ICES '00 Proceedings of the Third International Conference on Evolvable Systems: From Biology to Hardware
Intrusion Detection Using Variable-Length Audit Trail Patterns
RAID '00 Proceedings of the Third International Workshop on Recent Advances in Intrusion Detection
A Real-Time Intrusion Detection System Based on Learning Program Behavior
RAID '00 Proceedings of the Third International Workshop on Recent Advances in Intrusion Detection
BASIS: A Biological Approach to System Information Security
MMM-ACNS '01 Proceedings of the International Workshop on Information Assurance in Computer Networks: Methods, Models, and Architectures for Network Security
Information Security with Formal Immune Networks
MMM-ACNS '01 Proceedings of the International Workshop on Information Assurance in Computer Networks: Methods, Models, and Architectures for Network Security
D'Agents: Security in a Multiple-Language, Mobile-Agent System
Mobile Agents and Security
Taxonomy of security considerations and software quality
Communications of the ACM - E-services: a cornucopia of digital offerings ushers in the next Net-based evolution
Form: A Framework for Creating Views of Program Executions
ICSM '01 Proceedings of the IEEE International Conference on Software Maintenance (ICSM'01)
Decision tree classifiers for computer intrusion detection
Real-time system security
Lightweight agents for intrusion detection
Journal of Systems and Software
Indra: A peer-to-peer approach to network intrusion detection and prevention
WETICE '03 Proceedings of the Twelfth International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises
A Hardware Artificial Immune System and Embryonic Array for Fault Tolerant Systems
Genetic Programming and Evolvable Machines
Hybrid log segmentation for assured damage assessment
Proceedings of the 2003 ACM symposium on Applied computing
Towards NIC-based intrusion detection
Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery and data mining
Security applications of peer-to-peer networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
User re-authentication via mouse movements
Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security
HMM profiles for network traffic classification
Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security
Securing ad hoc networks through mobile agent
InfoSecu '04 Proceedings of the 3rd international conference on Information security
An new intrusion detection method based on linear prediction
InfoSecu '04 Proceedings of the 3rd international conference on Information security
Towards an Intrusion Detection System for Battery Exhaustion Attacks on Mobile Computing Devices
PERCOMW '05 Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications Workshops
Self-Management: The Solution to Complexity or Just Another Problem?
IEEE Distributed Systems Online
An innate immune system for the protection of computer networks
WISICT '05 Proceedings of the 4th international symposium on Information and communication technologies
Application of SVM and ANN for intrusion detection
Computers and Operations Research
Exploring an epidemic in an e-science environment
Communications of the ACM - Special issue: RFID
Architecture for an Artificial Immune System
Evolutionary Computation
Transaction fusion: a model for data recovery from information attacks
Journal of Intelligent Information Systems - Special issue: Database and applications security
An ethics and security course for students in computer science and information technology
Proceedings of the 37th SIGCSE technical symposium on Computer science education
Synapse: auto-correlation and dynamic attack redirection in an immunologically-inspired IDS
ACSW Frontiers '06 Proceedings of the 2006 Australasian workshops on Grid computing and e-research - Volume 54
Probabilistic anomaly detection in distributed computer networks
Science of Computer Programming
An evaluation of negative selection algorithm with constraint-based detectors
Proceedings of the 44th annual Southeast regional conference
NetHost-sensor: Monitoring a target host's application via system calls
Information Security Tech. Report
Self-healing systems - survey and synthesis
Decision Support Systems
A System Architecture for Computer Intrusion Detection
Information-Knowledge-Systems Management
D-SCIDS: distributed soft computing intrusion detection system
Journal of Network and Computer Applications - Special issue: Network and information security: A computational intelligence approach
Synthesizing fast intrusion prevention/detection systems from high-level specifications
SSYM'99 Proceedings of the 8th conference on USENIX Security Symposium - Volume 8
A study in using neural networks for anomaly and misuse detection
SSYM'99 Proceedings of the 8th conference on USENIX Security Symposium - Volume 8
On preventing intrusions by process behavior monitoring
ID'99 Proceedings of the 1st conference on Workshop on Intrusion Detection and Network Monitoring - Volume 1
Learning program behavior profiles for intrusion detection
ID'99 Proceedings of the 1st conference on Workshop on Intrusion Detection and Network Monitoring - Volume 1
A statistical method for profiling network traffic
ID'99 Proceedings of the 1st conference on Workshop on Intrusion Detection and Network Monitoring - Volume 1
Application areas of AIS: The past, the present and the future
Applied Soft Computing
Proceedings of the twenty-second IEEE/ACM international conference on Automated software engineering
Computational immunology and anomaly detection
Information Security Tech. Report
Immunological inspiration for building a new generation of autonomic systems
Proceedings of the 1st international conference on Autonomic computing and communication systems
Prevention of information attacks by run-time detection of self-replication in computer codes
Journal of Computer Security
Review: A review on blind detection for image steganography
Signal Processing
Theoretical advances in artificial immune systems
Theoretical Computer Science
Artificial Immunity-Based Discovery for Popular Information in WEB Pages
ICCS '07 Proceedings of the 7th international conference on Computational Science, Part IV: ICCS 2007
A Hybrid Model for Immune Inspired Network Intrusion Detection
ICARIS '08 Proceedings of the 7th international conference on Artificial Immune Systems
An Immune System Based Multi-robot Mobile Agent Network
ICARIS '08 Proceedings of the 7th international conference on Artificial Immune Systems
A Type-2 Fuzzy Set Recognition Algorithm for Artificial Immune Systems
HAIS '08 Proceedings of the 3rd international workshop on Hybrid Artificial Intelligence Systems
Anomaly detection in the case of message oriented middleware
Proceedings of the 2008 workshop on Middleware security
Expert Systems with Applications: An International Journal
Epidemiology and Wireless Communication: Tight Analogy or Loose Metaphor?
Bio-Inspired Computing and Communication
Bio-Inspired Computing and Communication
Expert Systems with Applications: An International Journal
Improving network intrusion detection through soft computing and natural immunology
ACS'08 Proceedings of the 8th conference on Applied computer scince
WSEAS Transactions on Information Science and Applications
Immune-based algorithms for dynamic optimization
Information Sciences: an International Journal
An Expanded Lateral Interactive Clonal Selection Algorithm and Its Application
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Efficient Algorithms for String-Based Negative Selection
ICARIS '09 Proceedings of the 8th International Conference on Artificial Immune Systems
Review: The use of computational intelligence in intrusion detection systems: A review
Applied Soft Computing
Thyroid disease diagnosis using Artificial Immune Recognition System (AIRS)
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human
Storage-Based Intrusion Detection Using Artificial Immune Technique
ISICA '09 Proceedings of the 4th International Symposium on Advances in Computation and Intelligence
Information Sciences: an International Journal
Finding abnormal events in home sensor network environment using correlation graph
SMC'09 Proceedings of the 2009 IEEE international conference on Systems, Man and Cybernetics
MILA: multilevel immune learning algorithm
GECCO'03 Proceedings of the 2003 international conference on Genetic and evolutionary computation: PartI
Immune inspired somatic contiguous hypermutation for function optimisation
GECCO'03 Proceedings of the 2003 international conference on Genetic and evolutionary computation: PartI
A risk-sensitive intrusion detection model
ICISC'02 Proceedings of the 5th international conference on Information security and cryptology
Design and implementation of security system based on immune system
ISSS'02 Proceedings of the 2002 Mext-NSF-JSPS international conference on Software security: theories and systems
A learning, multi-layered, hardware artificial immune system implemented upon an embryonic array
ICES'03 Proceedings of the 5th international conference on Evolvable systems: from biology to hardware
A self-adaptive evolutionary negative selection approach for home anomaly events detection
KES'07/WIRN'07 Proceedings of the 11th international conference, KES 2007 and XVII Italian workshop on neural networks conference on Knowledge-based intelligent information and engineering systems: Part III
An intrusion detection method based on system call temporal serial analysis
ICIC'07 Proceedings of the intelligent computing 3rd international conference on Advanced intelligent computing theories and applications
A computer security model of imitated nature immune and its FSM
LSMS'07 Proceedings of the Life system modeling and simulation 2007 international conference on Bio-Inspired computational intelligence and applications
Use of dimensionality reduction for intrusion detection
ICISS'07 Proceedings of the 3rd international conference on Information systems security
Masquerade detection based upon GUI user profiling in linux systems
ASIAN'07 Proceedings of the 12th Asian computing science conference on Advances in computer science: computer and network security
A new intrusion detection method based on antibody concentration
ICIC'09 Proceedings of the Intelligent computing 5th international conference on Emerging intelligent computing technology and applications
PROBE: a process behavior-based host intrusion prevention system
ISPEC'08 Proceedings of the 4th international conference on Information security practice and experience
A Survey of artificial immune applications
Artificial Intelligence Review
Negative selection algorithms without generating detectors
Proceedings of the 12th annual conference on Genetic and evolutionary computation
An immune memory clonal algorithm for numerical and combinatorial optimization
Frontiers of Computer Science in China
Properties and Evolution of Internet Traffic Networks from Anonymized Flow Data
ACM Transactions on Internet Technology (TOIT)
Artificial malware immunization based on dynamically assigned sense of self
ISC'10 Proceedings of the 13th international conference on Information security
A hybrid approach for learning concept hierarchy from Malay text using artificial immune network
Natural Computing: an international journal
Application of case-based reasoning to multi-sensor network intrusion detection
CIMMACS'05 Proceedings of the 4th WSEAS international conference on Computational intelligence, man-machine systems and cybernetics
Artificial immune system based on interval type-2 fuzzy set paradigm
Applied Soft Computing
Anomaly intrusion detection based upon an artificial immunity model
Proceedings of the 49th Annual Southeast Regional Conference
Specification-based intrusion detection system for WiBro
ICHIT'11 Proceedings of the 5th international conference on Convergence and hybrid information technology
A distributed surveillance model for network security inspired by immunology
AICI'11 Proceedings of the Third international conference on Artificial intelligence and computational intelligence - Volume Part II
Run-time malware detection based on positive selection
Journal in Computer Virology
What a webserver can learn from a zebra and what we learned in the process
CHIMIT '11 Proceedings of the 5th ACM Symposium on Computer Human Interaction for Management of Information Technology
Behavior evaluation with actions' sampling in multi-agent system
CEEMAS'05 Proceedings of the 4th international Central and Eastern European conference on Multi-Agent Systems and Applications
Grid intrusion detection based on immune agent
ICNC'06 Proceedings of the Second international conference on Advances in Natural Computation - Volume Part II
An immune mobile agent based grid intrusion detection model
SEAL'06 Proceedings of the 6th international conference on Simulated Evolution And Learning
Profiling network attacks via AIS
WIRN'05 Proceedings of the 16th Italian conference on Neural Nets
Challenges for artificial immune systems
WIRN'05 Proceedings of the 16th Italian conference on Neural Nets
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II
A new model for dynamic intrusion detection
CANS'05 Proceedings of the 4th international conference on Cryptology and Network Security
Immunity and mobile agent based intrusion detection for grid
PRIMA'06 Proceedings of the 9th Pacific Rim international conference on Agent Computing and Multi-Agent Systems
Malware: from modelling to practical detection
ICDCIT'10 Proceedings of the 6th international conference on Distributed Computing and Internet Technology
Immunity and mobile agent based grid intrusion detection
ICIC'06 Proceedings of the 2006 international conference on Computational Intelligence and Bioinformatics - Volume Part III
Lightweight defect localization for java
ECOOP'05 Proceedings of the 19th European conference on Object-Oriented Programming
Application areas of AIS: the past, the present and the future
ICARIS'05 Proceedings of the 4th international conference on Artificial Immune Systems
A fast host-based intrusion detection system using rough set theory
Transactions on Rough Sets IV
ESAW'05 Proceedings of the 6th international conference on Engineering Societies in the Agents World
Infrastructures for information technology systems: perspectives on their evolution and impact
SERA'04 Proceedings of the Second international conference on Software Engineering Research, Management and Applications
ESOA'05 Proceedings of the Third international conference on Engineering Self-Organising Systems
A survey of anomaly intrusion detection techniques
Journal of Computing Sciences in Colleges
Software fault prediction with object-oriented metrics based artificial immune recognition system
PROFES'07 Proceedings of the 8th international conference on Product-Focused Software Process Improvement
Research on cost-sensitive learning in one-class anomaly detection algorithms
ATC'07 Proceedings of the 4th international conference on Autonomic and Trusted Computing
A comparative study of negative selection based anomaly detection in sequence data
ICARIS'12 Proceedings of the 11th international conference on Artificial Immune Systems
The Journal of Supercomputing
Genetic optimized artificial immune system in spam detection: a review and a model
Artificial Intelligence Review
Hi-index | 48.26 |