参考文献
[1] de Castro L N, Timmis J. Artificial Immune Systems: A New Computational Intelligence Approach[M]. London, UK: Springer-Verlag, 2002.
[2] Li Tao. An Immunity Based Network Security Risk Estima- tion[J]. Science in China Series F: Information Sciences, 2005, 45(8): 557-578.
[3] Li Tao. An Immune Based Dynamic Intrusion Detection Model[J]. Chinese Science Bulletin, 2005, 50(22): 2650-2657.
[4] He Yang, Liang Yiwen, Li Tao, et al. A Method Inspired from Differential Coefficient for Calculating Danger Signals in Artificial Immune System[C]//Proc. of PACIIA’09. Wuhan, China: [s. n.], 2009.
[5] Stibor T. On the Appropriateness of Negative Selection for Anomaly Detection and Network Intrusion Detection[D]. Darmstadt, Germany: Darmstadt University of Technology, 2006.
[6] Greensmith J, Twycross U A J. Articulation and Clarification of the Dendritic Cell Algorithm[C]//Proc. of ICARIS’06. Oeiras, Portugal: [s. n.], 2006.
[7] Matzinger P. Tolerance, Danger, and the Extended Family[J]. Annual Review of Immunology, 1994, 12(1): 991-1045.
[8] Sarafijanovic S, le Boudec J. An Artificial Immune System Approach to Misbehavior Detection in Mobile Ad-hoc Networks with Virtual Thymus, Clustering, Danger Signal and Memory Detectors[J]. International Journal of Unconventional Computing, 2005, 1(2): 221-254.
[9] Gonzales L J, Cannady J. A Self-adaptive Negative Selection Approach for Anomaly Detection[C]//Proc. of CEC’04. San Diego, USA: IEEE Press, 2004.
[10] Hang Xiaoshu, Dai Honghua. Constructing Detectors in Schema Complementary Space for Anomaly Detection[C]// Proc. of GECCO’04. Berlin, Germany: Springer-Verlag, 2004.
[11] Zhou Ji, Dasgupta D. V-detector: An Efficient Negative Selection Algorithm with “Probably Adequate” Detector Coverage[J]. Information Sciences, 2009, 179(10): 1390-1406.
[12] 孙夫雄, 黄天戍. 免疫检测模型中检测器的激励响应机制研究[J]. 计算机学报, 2006, 29(11): 1929-1936.
(下转第142页)
(上接第138页)
[13] Aickelin U, Bentley P, Cayzer S, et al. Danger Theory: The Link Between AIS and IDS?[C]//Proc. of ICARIS’03. Edinburgh, UK: IEEE Press, 2003.
[14] Uwe A J G. Sensing Danger: Innate Immunology for Intrusion Detection[J]. Elsevier Information Security Technical Reports, 2007, 12(4): 218-227.
[15] Greensmith J. The Dendritic Cell Algorithm[D]. Nottingham, UK: University of Nottingham, 2007.
[16] Greensmith J, Aickelin U. Dendritic Cells for SYN Scan Detection[C]//Proc. of GECCO’07. London, UK: [s. n.], 2007.
[17] Al-Hammadi Y, Aickelin U, Greensmith J. DCA for Bot Detection[C]//Proc. of WCCI’08. [S. l.]: IEEE Press, 2008.
[18] Greensmith J, Feyereisl J, Aickelin U. The DCA: SOMe Comparison A Comparative Study Between Two Biologically- inspired Algorithms[J]. Evolutionary Intelligence, 2008, 1(2): 85-112.
[19] Fu Jun, Liang Yiwen, Tan Chengyu. Detecting Software Keyloggers with Dendritic Cell Algorithm[C]//Proc. of CMC’10. [S. l.]: IEEE Computer Society Press, 2010.
[20] Chelly Z, Elouedi Z. Further Exploration of the Fuzzy Dendritic Cell Method[C]//Proc. of ICARIS’11. Berlin, Germany: Springer-Verlag, 2011.
[21] Amaral J L M. Fault Detection in Analog Circuits Using a Fuzzy Dendritic Cell Algorithm[C]//Proc. of ICARIS’11. Berlin, Germany: Springer-Verlag, 2011.
[22] 张福勇, 齐德昱, 胡镜林. 基于IRP 的运行时恶意代码检测
方法[J]. 华南理工大学学报: 自然科学版, 2011, 39(2): 113-117.
[23] 陈岳兵, 冯 超, 张 权, 等. 基于DCA的数据融合方法研究[J]. 信号处理, 2011, 27(1): 102-108.
编辑 金胡考 |