Documents Related by Co-Citation

178 Computer Immunology – Stephanie Forrest, Steven A. Hofmeyr, Anil Somayaji - 1996
530 A Sense of Self for Unix Processes – Stephanie Forrest, Steven A. Hofmeyr, Anil Somayaji, Thomas A. Longstaff - 1996
102 A biologically inspired immune system for computers – Je Rey O. Kephart - 1994
274 Self-nonself discrimination in a computer – Stephanie Forrest, Alan S. Perelson, Lawrence Allen, Rajesh Cherukuri - 1994
116 An Immunological Approach to Change Detection: Algorithms – Stephanie Forrest, Paul Helman - 1996
293 Intrusion Detection using Sequences of System Calls – Steven A. Hofmeyr, Stephanie Forrest, Anil Somayaji - 1998
80 The Human Immune System and Network Intrusion Detection – Jungwon Kim, Peter Bentley - 2001
320 Data Mining Approaches for Intrusion Detection – Wenke Lee, Salvatore J. Stolfo
48 Computer Immunology – Mark Burgess, Computer Immunology - 1998
334 Detecting intrusion using system calls: alternative data models – Christina Warrender, Stephanie Forrest, Barak Pearlmutter - 1999
354 EMERALD: Event monitoring enabling responses to anomalous live disturbances – Phillip A. Porras, Peter G. Neumann - 1997
149 A Network Security Monitor – L Heberlein - 1990
257 An intrusion detection model – D E Denning - 1987
34 Immunity-Based Systems: A Survey – Dipankar Dasgupta, Nii Attoh-okine - 1997
3 Automated reponse using system-call delays – A Somayaji, S Forrest - 2000
13 Two dimensional time-series for anomaly detection and regulation in adaptive systems – M Burgess
25 A site configuration engine. Computing systems – M Burgess - 1995
28 An Artificial Immune Model for Network Intrusion Detection – Jungwon Kim, Peter Bentley - 1999
103 Novelty Detection in Time Series Data using Ideas from Immunology – Dipankar Dasgupta, Stephanie Forrest - 1995