- 1 Cohen, F. Computer viruses. Comput. Secu. 6 (1987), 22-35. Google ScholarDigital Library
- 2 Denning, D.E. An intrusion-detection model. IEEE Trans. Software Eng. 2, 222 (Feb. 1987), 118-131. Google ScholarDigital Library
- 3 D'haeseleer, P., Forrest, S., and Helman, P. An immunological approach to change detection: Algorithms, analysis, and implications. In Proceedings of the ~996 IEEE Symposium on Computer Security and Privacy (Oakland, Calif., May 6-8, 1996). IEEE Press, Los Alamitos, Calif., 1996, pp. 110-119. Google ScholarDigital Library
- 4 Forrest, S., Perelson, A.S., Allen, L., and Cherukuri, R. Self-nonself discrimination in a computer. In Proceedings of the 1994 IEEE Symposium on Research in Security and Privacy (Oakland, Calif., May 16-18, 1994). IEEE Computer Society Press, Los Alamitos, Calif., 1994, pp. 202-212. Google ScholarDigital Library
- 5 Forrest, S., Hofmeyr, S., Somayaji, A., and Longstaff, T. A sense of self for Unix processes. In Proceedings of the 1996 IEEE Symposium on Computer Security and Privacy (Oakland, Calif., May 6-8, 1996). IEEE Press, Los Alamitos, Calif., 1996, pp. 120-128. Google ScholarDigital Library
- 6 Janeway, C.A., and Travers, P. Immunobiology: The Immune System in Health and Disease, 2d ed. Current Biology Ltd., London, 1996.Google Scholar
- 7 Kephart, J.O., White, S.R., and Chess, D.M. Epidemiology of computer viruses. IEEE Spectrum 30, 5 (May 1993), 20-26. Google ScholarDigital Library
- 8 Kephart, J.O., Sorkin, G.B., Arnold, W.C., Chess, D.M., Tesauro, G.J., and White, S.R. Biologically inspired defenses against computer viruses. In Proceedings of the International Joint Conj%ence on Artificial Intelligence, 1995. Google ScholarDigital Library
- 9 Ko, C., Fink, G., and Levitt, K. Automated detection of vulnerabilities in privileged programs by execution monitoring. In Proceedings of the l Oth Annual Computer Security Applications Conj%ence (Dec. 5-9, 1994), pp. 134-144.Google ScholarCross Ref
- 10 Murray, W.H. The application of epidemiology to computer viruses. Comput. Secur. 7 (1988), 139-150. Google ScholarDigital Library
- 11 Percus, J.K., Percus, O., and Perelson, A.S. Predicting the size of the antibody-combining region from consideration of efficient self/nonself discrimination. In Proceedings of the National Academy of Science 90 (1993), pp. 1691-1695.Google ScholarCross Ref
- 12 Spafford, E.H. Computer viruses: A form of artificial life? In Artificial Lij~ II, C.G. Langton, C. Taylor, J.D. Farmer, and S. Rasmussen, eds. Addison-Wesley, Redwood City, Calif., 1992, pp. 727-745.Google Scholar
Index Terms
- Computer immunology
Recommendations
A Novel Computer Virus Detection Method from Ideas of Immunology
MINES '09: Proceedings of the 2009 International Conference on Multimedia Information Networking and Security - Volume 01In this paper, inspired by the change of antibody concentration in biological immune system, we present a Novel Computer Virus Detection Method from Ideas of Immunology (NCVDMII). In NCVDMII, the concepts and formal definitions of antibody, antigen, ...
Current paradigms in immunology
WIRN'05: Proceedings of the 16th Italian conference on Neural NetsThe last decade has seen a revolution in the field of Immunology. Starting from simple views on the ability of the immune system to respond to foreign antigens or to perform self/not-self discrimination, the image has become much more complex, with the ...
Comments