共 20 条
[1]
Dozier G., Brown D., Hou H., Et al., Vulnerability analysis of immunity-based intrusion detection systems using genetic and evolutionary hackers, Applied Soft Computing, 7, pp. 547-553, (2007)
[2]
Dhaeseleer P., Forrest S., Helman P., An immunological approach to change detection: theoretical results, IEEE Computer Society, pp. 18-27, (1996)
[3]
Forrest S., Perelson A.S., Allen L., Cherukuri R., SelfCnonself Discrimination in a Computer, pp. 202-212, (1994)
[4]
Forrest S., Dasgupta D., Artificial Immune System in Industrial Applications A, Proc. of the IPMM, (1999)
[5]
Hofmeyr S.A., Forrest S., Architecture for an artificial immune system, Evolutionary Computation, 7, 1, pp. 45-68, (2000)
[6]
Dasgupta D., Gonzale F., An immunity-based technique to characterize intrusions in computer networks, Evolutionary Computation, 6, 3, pp. 281-291, (2002)
[7]
Zeng J., Liu X., Li T., Et al., A self-adaptive negative selection algorithm used for anomaly detection, Natural Science, 19, pp. 261-266, (2009)
[8]
Kim J., Bentley P.J., An evaluation of negative selection in an artificial immune system for network intrusion detection, Proceedings of GECCO, (2001)
[9]
Kim J., Bentley P.J., Towards an artificial immune system for network intrusion detection: an investigation of dynamic colonel selection, Proceedings of the Congress on Evolutionary Computation (CEC-2002), pp. 1015-1020, (2002)
[10]
Gong M., Zhang J., Ma J., Jiao L., An efficient negative selection algorithm with further training for anomaly detection, Knowledge-Based Systems, 30, pp. 185-191, (2012)