Sciweavers

2598 search results - page 23 / 520
» The Abstract Immune System Algorithm
Sort
View
ICT
2004
Springer
181views Communications» more  ICT 2004»
14 years 2 months ago
Attack Evidence Detection, Recovery, and Signature Extraction with ADenoIdS
Abstract. This paper presents the ADenoIdS intrusion detection system (IDS). ADenoIdS takes some architectural inspiration from the human immune system and automates intrusion reco...
F. S. de Paula, P. L. de Geus
SOSP
2007
ACM
14 years 5 months ago
Attested append-only memory: making adversaries stick to their word
Researchers have made great strides in improving the fault tolerance of both centralized and replicated systems against arbitrary (Byzantine) faults. However, there are hard limit...
Byung-Gon Chun, Petros Maniatis, Scott Shenker, Jo...
ICARIS
2010
Springer
13 years 9 months ago
Biomedical Article Classification Using an Agent-Based Model of T-Cell Cross-Regulation
Abstract. We propose a novel bio-inspired solution for biomedical article classification. Our method draws from an existing model of T-cell cross-regulation in the vertebrate immun...
Alaa Abi-Haidar, Luis Mateus Rocha
COMCOM
2002
189views more  COMCOM 2002»
13 years 8 months ago
Intrusion detection techniques and approaches
Recent security incidents and analysis have demonstrated that manual response to such attacks is no longer feasible. Intrusion Detection systems offer techniques for modelling and...
Theuns Verwoerd, Ray Hunt
TEC
2002
89views more  TEC 2002»
13 years 8 months ago
An immunity-based technique to characterize intrusions in computer networks
Abstract--This paper presents a technique inspired by the negative selection mechanism of the immune system that can detect foreign patterns in the complement (nonself) space. In p...
Fabio A. González, Dipankar Dasgupta