Skip to main content
Article thumbnail
Location of Repository

Artificial Immune System and Intrusion Detection Tutorial

By Uwe Aickelin
OAI identifier: oai:eprints.nottingham.ac.uk:604
Provided by: Nottingham ePrints

Suggested articles

Citations

  1. (2002a), A Recommender System based on the Immune Network,
  2. (2003). Amazon.com Recommendations,
  3. (2002). An Artificial Immune Systems as a Recommender System for Web Sites,
  4. (2002). An Immunity-Based Technique to Characterize Intrusions in Computer Networks,
  5. (1999). Artificial Immune Systems and Their Applications,
  6. (2002). Constructing Attack Scenarios through Correlation of Intrusion Alerts,
  7. (2003). Danger Theory: The Link between Artificial Immune Systems and Intrusion Detection Systems?,
  8. (2001). Evaluating Negative Selection
  9. (2003). http://cmmg.biosci.wayne.edu/asg/polly.html Matzinger P
  10. (1997). Immunology for physicists doi
  11. (2002). Immunology, Fifth Edition by
  12. (2000). Kuby Immunology,
  13. (2001). Learning and Optimization Using the Clonal Selection Principle. Accepted for publication at the
  14. (2001). Multi-agent Learning in Recommender Systems For Information Filtering on the Internet
  15. On the Effects of Idiotypic Interactions for Recommendation Communities in Artificial Immune Systems,
  16. (2002). Positive and Negative Detection,
  17. (1997). Recommender systems doi
  18. (1994). Self-Nonself Discrimination in a Computer.
  19. (1999). The Artificial Immune Model for Network Intrusion Detection,
  20. (2002). The Danger Theory and Its Application to Artificial Immune Systems,
  21. (1995). The evolution of emergent organization in immune system gene libraries,
  22. (1986). The immune system, adaptation, and machine learning
  23. (1994). Tolerance, Danger and the Extended Family, Annual Review of Immunology, doi
  24. (1973). Towards a network theory of the immune system
  25. (2002). Towards an Artificial Immune Systems for Network Intrusion Detection: An
  26. (2002). Viewing Intrusion Detection Systems alerts: Lessons from SnortSnarf, http://www.silicondefense.com/ software/snortsnarf Hofmeyr S, Forrest S

To submit an update or takedown request for this paper, please submit an Update/Correction/Removal Request.