An Immunological Approach to Change Detection: Algorithms (1996)

Cached

Download Links

by Stephanie Forrest , Paul Helman
Venue:Analysis and Implications,” IEEE Symposium on Security and Privacy
Citations:115 - 19 self

Documents Related by Co-Citation

528 A Sense of Self for Unix Processes – Stephanie Forrest, Steven A. Hofmeyr, Anil Somayaji, Thomas A. Longstaff - 1996
273 Self-nonself discrimination in a computer – Stephanie Forrest, Alan S. Perelson, Lawrence Allen, Rajesh Cherukuri - 1994
176 Computer Immunology – Stephanie Forrest, Steven A. Hofmeyr, Anil Somayaji - 1996
86 An Immunological Model of Distributed Detection and Its Application to Computer Security – Steven Andrew Hofmeyr - 1999
99 Novelty Detection in Time Series Data using Ideas from Immunology – Dipankar Dasgupta, Stephanie Forrest - 1995
35 An immunological approach to change detection: Theoretical results – P D’haeseleer - 1996
455 An intrusion-detection model – Dorothy E. Denning - 1987
101 A biologically inspired immune system for computers – Jeffrey O. Kephart - 1994
351 EMERALD: Event monitoring enabling responses to anomalous live disturbances – Phillip A. Porras, Peter G. Neumann - 1997
292 Intrusion Detection using Sequences of System Calls – Steven A. Hofmeyr, Stephanie Forrest, Anil Somayaji - 1998
147 A Network Security Monitor – L Heberlein, G Dias, K Levitt, B Mukherjee, J Wood, D Wolber - 1990
19 Predicting the size of the antibody combining region from condideration of efficient self/non-self discrimination – J K Percus, O Percus, A S Perelson - 1993
128 Architecture for an Artificial Immune System – Steven A. Hofmeyr, S. Forrest - 2000
60 An Evaluation of Negative Selection in an Artificial Immune System for Network Intrusion Detection – Jungwon Kim, Peter J. Bentley - 2001
320 Data Mining Approaches for Intrusion Detection – Wenke Lee, Salvatore J. Stolfo
11 Predicting the size of the antibody-combining region from consideration of efficient self/nonself discrimination – J K Percus, O E Percus, A S Perelson - 1993
225 Network intrusion detection – B Mukherjee, L T Heberlein, K N Levitt - 1994
249 Towards a network theory of the immune system – N K Jerne - 1974
275 State Transition Analysis: A Rule-Based Intrusion Detection Approach – Koral Ilgun, Richard A. Kemmerer, Phillip A. Porras - 1995