skip to main content
article
Free Access

Computer immunology

Published:01 October 1997Publication History
First page image

References

  1. 1 Cohen, F. Computer viruses. Comput. Secu. 6 (1987), 22-35. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. 2 Denning, D.E. An intrusion-detection model. IEEE Trans. Software Eng. 2, 222 (Feb. 1987), 118-131. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. 3 D'haeseleer, P., Forrest, S., and Helman, P. An immunological approach to change detection: Algorithms, analysis, and implications. In Proceedings of the ~996 IEEE Symposium on Computer Security and Privacy (Oakland, Calif., May 6-8, 1996). IEEE Press, Los Alamitos, Calif., 1996, pp. 110-119. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. 4 Forrest, S., Perelson, A.S., Allen, L., and Cherukuri, R. Self-nonself discrimination in a computer. In Proceedings of the 1994 IEEE Symposium on Research in Security and Privacy (Oakland, Calif., May 16-18, 1994). IEEE Computer Society Press, Los Alamitos, Calif., 1994, pp. 202-212. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. 5 Forrest, S., Hofmeyr, S., Somayaji, A., and Longstaff, T. A sense of self for Unix processes. In Proceedings of the 1996 IEEE Symposium on Computer Security and Privacy (Oakland, Calif., May 6-8, 1996). IEEE Press, Los Alamitos, Calif., 1996, pp. 120-128. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. 6 Janeway, C.A., and Travers, P. Immunobiology: The Immune System in Health and Disease, 2d ed. Current Biology Ltd., London, 1996.Google ScholarGoogle Scholar
  7. 7 Kephart, J.O., White, S.R., and Chess, D.M. Epidemiology of computer viruses. IEEE Spectrum 30, 5 (May 1993), 20-26. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. 8 Kephart, J.O., Sorkin, G.B., Arnold, W.C., Chess, D.M., Tesauro, G.J., and White, S.R. Biologically inspired defenses against computer viruses. In Proceedings of the International Joint Conj%ence on Artificial Intelligence, 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. 9 Ko, C., Fink, G., and Levitt, K. Automated detection of vulnerabilities in privileged programs by execution monitoring. In Proceedings of the l Oth Annual Computer Security Applications Conj%ence (Dec. 5-9, 1994), pp. 134-144.Google ScholarGoogle ScholarCross RefCross Ref
  10. 10 Murray, W.H. The application of epidemiology to computer viruses. Comput. Secur. 7 (1988), 139-150. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. 11 Percus, J.K., Percus, O., and Perelson, A.S. Predicting the size of the antibody-combining region from consideration of efficient self/nonself discrimination. In Proceedings of the National Academy of Science 90 (1993), pp. 1691-1695.Google ScholarGoogle ScholarCross RefCross Ref
  12. 12 Spafford, E.H. Computer viruses: A form of artificial life? In Artificial Lij~ II, C.G. Langton, C. Taylor, J.D. Farmer, and S. Rasmussen, eds. Addison-Wesley, Redwood City, Calif., 1992, pp. 727-745.Google ScholarGoogle Scholar

Index Terms

  1. Computer immunology

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in

            Full Access

            • Published in

              cover image Communications of the ACM
              Communications of the ACM  Volume 40, Issue 10
              Oct. 1997
              104 pages
              ISSN:0001-0782
              EISSN:1557-7317
              DOI:10.1145/262793
              Issue’s Table of Contents

              Copyright © 1997 ACM

              Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 1 October 1997

              Permissions

              Request permissions about this article.

              Request Permissions

              Check for updates

              Qualifiers

              • article

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader