The immune system is an impressive information processing system with many appealing properties for solving problems. Artificial immune systems are a paradigm inspired by the immune system and are used for solving computational and information processing problems. In this paper, we outline two different immune-inspired approaches typically used for IT-security problems. Specifically, we present one of the first proposed immune inspired approaches for network intrusion detection, this is then complimented with an overview of recent investigations on the latest immunological theories and how they may be exploited in IT-security. We then present an artificial immune system concept for database security which encompasses issues such as confiden...
The immune system provides an ideal metaphor for anomaly detection in general and computer security ...
Thesis (Ph.D.)--University of Hawaii at Manoa, 2008.The NetTRIIAD prototype demonstrates a reduction...
The immune system provides an ideal metaphor for anomaly detection in general and computer security ...
The use of artificial immune systems in intrusion detection is an appealing concept for two reasons....
The use of artificial immune systems in intrusion detection is an appealing concept for two reasons....
The use of artificial immune systems in intrusion detection is an appealing concept for two reasons....
The use of artificial immune systems in intrusion detection is an appealing concept for two reasons....
It is believed that many of the mechanisms present in the biological immune system are well suited f...
It is believed that many of the mechanisms present in the biological immune system are well suited f...
Abstract. The use of artificial immune systems in intrusion detection is an appealing concept ...
Abstract. The use of artificial immune systems in intrusion detection is an appealing concept...
The use of artificial immune systems in intrusion detection is an appealing concept for two reasons....
The use of artificial immune systems in intrusion detection is an appealing concept for two reasons....
The use of artificial immune systems in intrusion detection is an appealing concept for two reasons....
The immune system provides an ideal metaphor for anomaly detection in general and computer securitie...
The immune system provides an ideal metaphor for anomaly detection in general and computer security ...
Thesis (Ph.D.)--University of Hawaii at Manoa, 2008.The NetTRIIAD prototype demonstrates a reduction...
The immune system provides an ideal metaphor for anomaly detection in general and computer security ...
The use of artificial immune systems in intrusion detection is an appealing concept for two reasons....
The use of artificial immune systems in intrusion detection is an appealing concept for two reasons....
The use of artificial immune systems in intrusion detection is an appealing concept for two reasons....
The use of artificial immune systems in intrusion detection is an appealing concept for two reasons....
It is believed that many of the mechanisms present in the biological immune system are well suited f...
It is believed that many of the mechanisms present in the biological immune system are well suited f...
Abstract. The use of artificial immune systems in intrusion detection is an appealing concept ...
Abstract. The use of artificial immune systems in intrusion detection is an appealing concept...
The use of artificial immune systems in intrusion detection is an appealing concept for two reasons....
The use of artificial immune systems in intrusion detection is an appealing concept for two reasons....
The use of artificial immune systems in intrusion detection is an appealing concept for two reasons....
The immune system provides an ideal metaphor for anomaly detection in general and computer securitie...
The immune system provides an ideal metaphor for anomaly detection in general and computer security ...
Thesis (Ph.D.)--University of Hawaii at Manoa, 2008.The NetTRIIAD prototype demonstrates a reduction...
The immune system provides an ideal metaphor for anomaly detection in general and computer security ...