Abstract. Network Intrusion Detection Systems (NIDS) monitor a network with the aim of discerning malicious from benign activity on that network. While a wide range of approaches h...
The immune system provides an ideal metaphor for anomaly detection in general and computer security in particular. Based on this idea, artificial immune systems have been used for...
libtissue is a software system for implementing and testing AIS algorithms on real-world computer security problems. AIS algorithms are implemented as a collection of cells, antig...
In this paper, an immune-inspired model, named IA-AIS (Innate and Adaptive Artificial Immune System) is proposed and applied to the problem of identification of unsolicited bulk e...
Thiago S. Guzella, Tomaz A. Mota-Santos, Joaquim Q...
The threats and intrusions in IT systems can basically be compared to human diseases with the difference that the human body has an effective way to deal with them, what still nee...