Implementation of a Computer Immune System for Intrusion- and Virus Detection

作者: Markus Christoph Unterleitner

DOI:

关键词:

摘要:

参考文章(39)
Sandeep Phadke, Milind Borate, Prasad Dabak, Undocumented Windows NT ,(1999)
Paul Wolfe, Charlie Scott, Snort for dummies ,(2004)
Justin Balthrop, David H. Ackley, Stephanie Forrest, Matthew Glickman, Computation in the Wild. The Internet as a Large-Scale Complex System. pp. 227- 250 ,(2005)
Stephanie Forrest, Fernando Esponda, Detector coverage under the r-contiguous bits matching rule ,(2002)
Jack Koziol, Intrusion Detection with Snort ,(2003)
Rune Schmidt Jensen, Immune system for virus detection and elimination Department of Informatics and Mathematical Modeling, Technical University of Denmark, DTU : DK-2800 Kgs. Lyngby, Denmark. ,(2002)
David G. Stork, Richard O. Duda, Peter E. Hart, Pattern Classification (2nd Edition) Wiley-Interscience. ,(2000)
Sanjay Goel, Stephen F. S. F. Bush, Biological models of security for virus propagation in computer networks login Usenix Mag.. ,vol. 29, ,(2004)