— This paper introduces Policy based Management Information Base to mange danger in Artificial Immune System inspired secure routing in Wireless Mesh Networks. WMN management fun...
Today’s signature-based intrusion detection systems are reactive in nature and storage-limited. Their operation depends upon catching an instance of an intrusion or virus and en...
Charles R. Haag, Gary B. Lamont, Paul D. Williams,...
In this paper we present an Artificial Immune System (AIS) based security framework, which prevents a number of serious Denial of Service (DoS) attacks. The proposed security frame...
The objective of this paper is to investigate how a Danger Theory based Artificial Immune System--in particular the Dendritic Cell Algorithm (DCA) can detect an attack on a sensor ...
Christian Wallenta, Jungwon Kim, Peter J. Bentley,...