A New Model of Security for Distributed Systems
A New Model of Security for Distributed Systems
NATE: Network Analysis of Anomalous Traffic Events, a low-cost approach
Proceedings of the 2001 workshop on New security paradigms
Antigens, Antibodies, and the World Wide Web
ECAL '01 Proceedings of the 6th European Conference on Advances in Artificial Life
A Middleware for Large Scale Networks Inspired by the Immune System
IPDPS '02 Proceedings of the 16th International Parallel and Distributed Processing Symposium
CDIS: Towards a Computer Immune System for Detecting Network Intrusions
RAID '00 Proceedings of the 4th International Symposium on Recent Advances in Intrusion Detection
Agent-Based Model of Computer Network Security System: A Case Study
MMM-ACNS '01 Proceedings of the International Workshop on Information Assurance in Computer Networks: Methods, Models, and Architectures for Network Security
BASIS: A Biological Approach to System Information Security
MMM-ACNS '01 Proceedings of the International Workshop on Information Assurance in Computer Networks: Methods, Models, and Architectures for Network Security
Information Security with Formal Immune Networks
MMM-ACNS '01 Proceedings of the International Workshop on Information Assurance in Computer Networks: Methods, Models, and Architectures for Network Security
An Architecture for Self-Healing Digital Systems
Journal of Electronic Testing: Theory and Applications
Configurable immunity for evolving human-computer systems
Science of Computer Programming - Methods of software design: Techniques and applications
Securing ad hoc networks through mobile agent
InfoSecu '04 Proceedings of the 3rd international conference on Information security
Principle Components and Importance Ranking of Distributed Anomalies
Machine Learning
IPDPS '05 Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05) - Workshop 6 - Volume 07
Self-organization and computer security: a case study in adaptive coordination
Proceedings of the 2005 ACM symposium on Applied computing
Self-healing mechanisms for kernel system compromises
WOSS '04 Proceedings of the 1st ACM SIGSOFT workshop on Self-managed systems
A control theory perspective on configuration management and Cfengine
ACM SIGBED Review
Probabilistic anomaly detection in distributed computer networks
Science of Computer Programming
Automated response using system-call delays
SSYM'00 Proceedings of the 9th conference on USENIX Security Symposium - Volume 9
Biologically-inspired Complex Adaptive Systems approaches to Network Intrusion Detection
Information Security Tech. Report
Biology, immunology and information security
Information Security Tech. Report
Information Security Tech. Report
The future of biologically-inspired security: is there anything left to learn?
NSPW '07 Proceedings of the 2007 Workshop on New Security Paradigms
An Immunity Inspired Real-Time Cooperative Control Framework for Networked Multi-agent Systems
ICARIS '09 Proceedings of the 8th International Conference on Artificial Immune Systems
Review: The use of computational intelligence in intrusion detection systems: A review
Applied Soft Computing
Proceedings of the 2010 Workshop on Interaction between Compilers and Computer Architecture
Fault tolerance via endocrinologic based communication for multiprocessor systems
ICES'03 Proceedings of the 5th international conference on Evolvable systems: from biology to hardware
A cooperative immunological approach for detecting network anomaly
Applied Soft Computing
Anomaly intrusion detection based upon an artificial immunity model
Proceedings of the 49th Annual Southeast Regional Conference
Algorithms of non-self detector by negative selection principle in artificial immune system
ICNC'05 Proceedings of the First international conference on Advances in Natural Computation - Volume Part II
Grid intrusion detection based on immune agent
ICNC'06 Proceedings of the Second international conference on Advances in Natural Computation - Volume Part II
An immune mobile agent based grid intrusion detection model
SEAL'06 Proceedings of the 6th international conference on Simulated Evolution And Learning
A new model for dynamic intrusion detection
CANS'05 Proceedings of the 4th international conference on Cryptology and Network Security
Immunity and mobile agent based intrusion detection for grid
PRIMA'06 Proceedings of the 9th Pacific Rim international conference on Agent Computing and Multi-Agent Systems
Immunity and mobile agent based grid intrusion detection
ICIC'06 Proceedings of the 2006 international conference on Computational Intelligence and Bioinformatics - Volume Part III
A bio-inspired approach for self-protecting an organic middleware with artificial antibodies
IWSOS'06/EuroNGI'06 Proceedings of the First international conference, and Proceedings of the Third international conference on New Trends in Network Architectures and Services conference on Self-Organising Systems
ESOA'05 Proceedings of the Third international conference on Engineering Self-Organising Systems
WCIS: a prototype for detecting zero-day attacks in web server requests
LISA'11 Proceedings of the 25th international conference on Large Installation System Administration
Artificial Immune Systems: Models, Applications, and challenges
Proceedings of the 27th Annual ACM Symposium on Applied Computing
A new blind method for detecting novel steganography
Digital Investigation: The International Journal of Digital Forensics & Incident Response
A danger feature based negative selection algorithm
ICSI'12 Proceedings of the Third international conference on Advances in Swarm Intelligence - Volume Part I
Research on cost-sensitive learning in one-class anomaly detection algorithms
ATC'07 Proceedings of the 4th international conference on Autonomic and Trusted Computing
Software health management with Bayesian networks
Innovations in Systems and Software Engineering
Hi-index | 0.00 |