[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
article
Free access

Computer immunology

Published: 01 October 1997 Publication History
First page of PDF

References

[1]
Cohen, F. Computer viruses. Comput. Secu. 6 (1987), 22-35.
[2]
Denning, D.E. An intrusion-detection model. IEEE Trans. Software Eng. 2, 222 (Feb. 1987), 118-131.
[3]
D'haeseleer, P., Forrest, S., and Helman, P. An immunological approach to change detection: Algorithms, analysis, and implications. In Proceedings of the ~996 IEEE Symposium on Computer Security and Privacy (Oakland, Calif., May 6-8, 1996). IEEE Press, Los Alamitos, Calif., 1996, pp. 110-119.
[4]
Forrest, S., Perelson, A.S., Allen, L., and Cherukuri, R. Self-nonself discrimination in a computer. In Proceedings of the 1994 IEEE Symposium on Research in Security and Privacy (Oakland, Calif., May 16-18, 1994). IEEE Computer Society Press, Los Alamitos, Calif., 1994, pp. 202-212.
[5]
Forrest, S., Hofmeyr, S., Somayaji, A., and Longstaff, T. A sense of self for Unix processes. In Proceedings of the 1996 IEEE Symposium on Computer Security and Privacy (Oakland, Calif., May 6-8, 1996). IEEE Press, Los Alamitos, Calif., 1996, pp. 120-128.
[6]
Janeway, C.A., and Travers, P. Immunobiology: The Immune System in Health and Disease, 2d ed. Current Biology Ltd., London, 1996.
[7]
Kephart, J.O., White, S.R., and Chess, D.M. Epidemiology of computer viruses. IEEE Spectrum 30, 5 (May 1993), 20-26.
[8]
Kephart, J.O., Sorkin, G.B., Arnold, W.C., Chess, D.M., Tesauro, G.J., and White, S.R. Biologically inspired defenses against computer viruses. In Proceedings of the International Joint Conj%ence on Artificial Intelligence, 1995.
[9]
Ko, C., Fink, G., and Levitt, K. Automated detection of vulnerabilities in privileged programs by execution monitoring. In Proceedings of the l Oth Annual Computer Security Applications Conj%ence (Dec. 5-9, 1994), pp. 134-144.
[10]
Murray, W.H. The application of epidemiology to computer viruses. Comput. Secur. 7 (1988), 139-150.
[11]
Percus, J.K., Percus, O., and Perelson, A.S. Predicting the size of the antibody-combining region from consideration of efficient self/nonself discrimination. In Proceedings of the National Academy of Science 90 (1993), pp. 1691-1695.
[12]
Spafford, E.H. Computer viruses: A form of artificial life? In Artificial Lij~ II, C.G. Langton, C. Taylor, J.D. Farmer, and S. Rasmussen, eds. Addison-Wesley, Redwood City, Calif., 1992, pp. 727-745.

Cited By

View all
  • (2024)BR-HIDF: An Anti-Sparsity and Effective Host Intrusion Detection Framework Based on Multi-Granularity Feature ExtractionIEEE Transactions on Information Forensics and Security10.1109/TIFS.2023.332438819(485-499)Online publication date: 1-Jan-2024
  • (2024)An Antibody-Mediated Immune Mechanism in Botnet Defense System2024 International Conference on Future Technologies for Smart Society (ICFTSS)10.1109/ICFTSS61109.2024.10691330(161-164)Online publication date: 7-Aug-2024
  • (2024)Artificial Immune System and Machine Learning: A Synergistic Approach for Banking Fraud Detection2024 4th International Conference on Embedded & Distributed Systems (EDiS)10.1109/EDiS63605.2024.10783380(16-21)Online publication date: 3-Nov-2024
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Communications of the ACM
Communications of the ACM  Volume 40, Issue 10
Oct. 1997
104 pages
ISSN:0001-0782
EISSN:1557-7317
DOI:10.1145/262793
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 October 1997
Published in CACM Volume 40, Issue 10

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)450
  • Downloads (Last 6 weeks)48
Reflects downloads up to 16 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2024)BR-HIDF: An Anti-Sparsity and Effective Host Intrusion Detection Framework Based on Multi-Granularity Feature ExtractionIEEE Transactions on Information Forensics and Security10.1109/TIFS.2023.332438819(485-499)Online publication date: 1-Jan-2024
  • (2024)An Antibody-Mediated Immune Mechanism in Botnet Defense System2024 International Conference on Future Technologies for Smart Society (ICFTSS)10.1109/ICFTSS61109.2024.10691330(161-164)Online publication date: 7-Aug-2024
  • (2024)Artificial Immune System and Machine Learning: A Synergistic Approach for Banking Fraud Detection2024 4th International Conference on Embedded & Distributed Systems (EDiS)10.1109/EDiS63605.2024.10783380(16-21)Online publication date: 3-Nov-2024
  • (2024)DL-HIDS: deep learning-based host intrusion detection system using system calls-to-image for containerized cloud environmentThe Journal of Supercomputing10.1007/s11227-024-05895-380:9(12218-12246)Online publication date: 1-Jun-2024
  • (2023)Research on network intrusion detection based on Whitening PCA and CNN2023 7th International Conference on Smart Grid and Smart Cities (ICSGSC)10.1109/ICSGSC59580.2023.10319169(232-237)Online publication date: 22-Sep-2023
  • (2023)The Aesthetics of Musical Complex SystemsOrganised Sound10.1017/S1355771823000523(1-11)Online publication date: 22-Aug-2023
  • (2022)Towards Double Defense Network Security Based on Multi-Identifier Network ArchitectureSensors10.3390/s2203074722:3(747)Online publication date: 19-Jan-2022
  • (2022)Modern Immunological Models and Their ApplicationsHerald of the Bauman Moscow State Technical University. Series Instrument Engineering10.18698/0236-3933-2022-3-61-77(61-77)Online publication date: Sep-2022
  • (2022)Learning Outside the Brain: Integrating Cognitive Science and Systems BiologyProceedings of the IEEE10.1109/JPROC.2022.3162791110:5(590-612)Online publication date: May-2022
  • (2022)Numerical Assessments Employing Neural Networks for a Novel Drafted Anti-Virus Subcategory in a Nonlinear Fractional-Order SIR Differential SystemIEEE Access10.1109/ACCESS.2022.321766310(114192-114202)Online publication date: 2022
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Full Access

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media