Using internal sensors and embedded detectors for intrusion detection
Journal of Computer Security
Intrusion Detection Based on the Immune Human System
IPDPS '02 Proceedings of the 16th International Parallel and Distributed Processing Symposium
A Middleware for Large Scale Networks Inspired by the Immune System
IPDPS '02 Proceedings of the 16th International Parallel and Distributed Processing Symposium
A Useful Intrusion Detection System Prototype to Monitor Multi-processes Based on System Calls
ICICS '01 Proceedings of the Third International Conference on Information and Communications Security
NIDS Research Based on Artificial Immunology
ICICS '01 Proceedings of the Third International Conference on Information and Communications Security
Anomaly intrusion detection in dynamic execution environments
Proceedings of the 2002 workshop on New security paradigms
Genetic Programming and Evolvable Machines
Design and application of hybrid intelligent systems
Resilient infrastructure for network security
Complexity - Special issue: Resilient and adaptive defense of computing networks
Immune Memory and Gene Library Evolution in the Dynamic Clonal Selection Algorithm
Genetic Programming and Evolvable Machines
An artificial immune based intrusion detection model for computer and telecommunication systems
Parallel Computing - Special issue: Parallel and nature-inspired computational paradigms and applications
The T-detectors maturation algorithm based on match range model
Proceedings of the 2005 ACM symposium on Applied computing
Proceedings of the 2005 ACM symposium on Applied computing
Architecture for an Artificial Immune System
Evolutionary Computation
A Machine Learning Evaluation of an Artificial Immune System
Evolutionary Computation
A retrovirus inspired algorithm for virus detection & optimization
Proceedings of the 8th annual conference on Genetic and evolutionary computation
Synapse: auto-correlation and dynamic attack redirection in an immunologically-inspired IDS
ACSW Frontiers '06 Proceedings of the 2006 Australasian workshops on Grid computing and e-research - Volume 54
Early detection and propagation mitigation of worm programs
Proceedings of the 43rd annual Southeast regional conference - Volume 2
Proceedings of the 4th ACM workshop on Recurring malcode
Learning DFA representations of HTTP for protecting web applications
Computer Networks: The International Journal of Computer and Telecommunications Networking
Journal of Network and Computer Applications - Special issue: Network and information security: A computational intelligence approach
Automated response using system-call delays
SSYM'00 Proceedings of the 9th conference on USENIX Security Symposium - Volume 9
Revisiting Negative Selection Algorithms
Evolutionary Computation
Dendritic cells for SYN scan detection
Proceedings of the 9th annual conference on Genetic and evolutionary computation
Information Security Tech. Report
Combatting financial fraud: a coevolutionary anomaly detection approach
Proceedings of the 10th annual conference on Genetic and evolutionary computation
Locality-Based Server Profiling for Intrusion Detection
PAISI, PACCF and SOCO '08 Proceedings of the IEEE ISI 2008 PAISI, PACCF, and SOCO international workshops on Intelligence and Security Informatics
A Type-2 Fuzzy Set Recognition Algorithm for Artificial Immune Systems
HAIS '08 Proceedings of the 3rd international workshop on Hybrid Artificial Intelligence Systems
T-detector maturation algorithm with overlap rate
WSEAS Transactions on Computers
Honeybee-Based Model to Detect Intrusion
ISA '09 Proceedings of the 3rd International Conference and Workshops on Advances in Information Security and Assurance
The future of biologically-inspired security: is there anything left to learn?
NSPW '07 Proceedings of the 2007 Workshop on New Security Paradigms
Foundations of r-contiguous matching in negative selection for anomaly detection
Natural Computing: an international journal
Review: The use of computational intelligence in intrusion detection systems: A review
Applied Soft Computing
A survey on bio-inspired networking
Computer Networks: The International Journal of Computer and Telecommunications Networking
Novel immune-based framework for securing ad hoc networks
Proceedings of the 2010 ACM Symposium on Applied Computing
A Survey of artificial immune applications
Artificial Intelligence Review
A model of collaborative artificial immune system
CAR'10 Proceedings of the 2nd international Asia conference on Informatics in control, automation and robotics - Volume 3
Artificial immune system based on interval type-2 fuzzy set paradigm
Applied Soft Computing
On permutation masks in hamming negative selection
ICARIS'06 Proceedings of the 5th international conference on Artificial Immune Systems
Articulation and clarification of the dendritic cell algorithm
ICARIS'06 Proceedings of the 5th international conference on Artificial Immune Systems
Dynamic negative selection algorithm based on match range model
AI'05 Proceedings of the 18th Australian Joint conference on Advances in Artificial Intelligence
Static clonal selection algorithm based on match range model
IEA/AIE'06 Proceedings of the 19th international conference on Advances in Applied Artificial Intelligence: industrial, Engineering and Other Applications of Applied Intelligent Systems
An immune-based model for computer virus detection
CANS'05 Proceedings of the 4th international conference on Cryptology and Network Security
Mitigating network denial-of-service through diversity-based traffic management
ACNS'05 Proceedings of the Third international conference on Applied Cryptography and Network Security
The t-detectors maturation algorithm based on genetic algorithm
AI'04 Proceedings of the 17th Australian joint conference on Advances in Artificial Intelligence
Adaptive hybrid immune detector maturation algorithm
HAIS'10 Proceedings of the 5th international conference on Hybrid Artificial Intelligence Systems - Volume Part II
Introducing dendritic cells as a novel immune-inspired algorithm for anomaly detection
ICARIS'05 Proceedings of the 4th international conference on Artificial Immune Systems
Improving the generalization capability of hybrid immune detector maturation algorithm
HAIS'12 Proceedings of the 7th international conference on Hybrid Artificial Intelligent Systems - Volume Part I
A transitional view of immune inspired techniques for anomaly detection
IDEAL'12 Proceedings of the 13th international conference on Intelligent Data Engineering and Automated Learning
An architecture for cloud computing and human immunity based network intrusion detection
AICI'12 Proceedings of the 4th international conference on Artificial Intelligence and Computational Intelligence
Application of the feature-detection rule to the Negative Selection Algorithm
Expert Systems with Applications: An International Journal
Hi-index | 0.00 |