Sciweavers

27 search results - page 2 / 6
» Applying Similarities Between Immune Systems And Mobile Agen...
Sort
View
GECCO
2003
Springer
147views Optimization» more  GECCO 2003»
13 years 10 months ago
Developing an Immunity to Spam
Immune systems protect animals from pathogens, so why not apply a similar model to protect computers? Several researchers have investigated the use of an artificial immune system ...
Terri Oda, Tony White
ICC
2007
IEEE
147views Communications» more  ICC 2007»
13 years 11 months ago
A Cooperative AIS Framework for Intrusion Detection
Abstract— We present a cooperative intrusion detection approach inspired by biological immune system principles and P2P communication techniques to develop a distributed anomaly ...
Katja Luther, Rainer Bye, Tansu Alpcan, Achim M&uu...
CORR
2010
Springer
143views Education» more  CORR 2010»
13 years 5 months ago
Dendritic Cells for Anomaly Detection
Artificial immune systems, more specifically the negative selection algorithm, have previously been applied to intrusion detection. The aim of this research is to develop an intrus...
Julie Greensmith, Jamie Twycross, Uwe Aickelin
ETRICS
2006
13 years 8 months ago
Requirements of Information Reductions for Cooperating Intrusion Detection Agents
Abstract. We consider cooperating intrusion detection agents that limit the cooperation information flow with a focus on privacy and confidentiality. Generalizing our previous work...
Ulrich Flegel, Joachim Biskup
MATA
2004
Springer
189views Communications» more  MATA 2004»
13 years 10 months ago
APHIDS: A Mobile Agent-Based Programmable Hybrid Intrusion Detection System
Abstract. Intrusion detection systems are quickly becoming a standard requirement in building a network security infrastructure. Although many established techniques and commercial...
Ken Deeter, Kapil Singh, Steve Wilson, Luca Filipo...