Results 1 - 10
of
22,134
A Sense of Self for Unix Processes
- In Proceedings of the 1996 IEEE Symposium on Security and Privacy
, 1996
"... A method for anomaly detection is introduced in which "normal" is defined by short-range correlations in a process ' system calls. Initial experiments suggest that the definition is stable during normal behavior for standard UNIX programs. Further, it is able to detect several common ..."
Abstract
-
Cited by 689 (27 self)
- Add to MetaCart
intrusions involving sendmail and lpr. This work is part of a research program aimed at building computer security systems that incorporate the mechanisms and algorithms used by natural immune systems. 1 Introduction We are interested in developing computer security methods that are based on the way natural
Architecture for an Artificial Immune System
, 2000
"... An articial immune system (ARTIS) is described which incorporates many properties of natural immune systems, including diversity, distributed computation, error tolerance, dynamic learning and adaptation and self-monitoring. ARTIS is a general framework for a distributed adaptive system and could ..."
Abstract
-
Cited by 173 (10 self)
- Add to MetaCart
An articial immune system (ARTIS) is described which incorporates many properties of natural immune systems, including diversity, distributed computation, error tolerance, dynamic learning and adaptation and self-monitoring. ARTIS is a general framework for a distributed adaptive system
Immunity by Design: An Artificial Immune System
, 1999
"... We describe an artificial immune system (AIS) that is distributed, robust, dynamic, diverse and adaptive. It captures many features of the vertebrate immune system and places them in the context of the problem of protecting a network of computers from illegal intrusions. ..."
Abstract
-
Cited by 105 (6 self)
- Add to MetaCart
We describe an artificial immune system (AIS) that is distributed, robust, dynamic, diverse and adaptive. It captures many features of the vertebrate immune system and places them in the context of the problem of protecting a network of computers from illegal intrusions.
CIL: Intermediate language and tools for analysis and transformation of C programs
- In International Conference on Compiler Construction
, 2002
"... Abstract. This paper describes the CIntermediate Language: a highlevel representation along with a set of tools that permit easy analysis and source-to-source transformation of C programs. Compared to C, CIL has fewer constructs. It breaks down certain complicated constructs of C into simpler ones, ..."
Abstract
-
Cited by 533 (11 self)
- Add to MetaCart
for program analysis and transformation. We also describe a whole-program merger based on structural type equality, allowing a complete project to be viewed as a single compilation unit. As a representative application of CIL, we show a transformation aimed at making code immune to stack-smashing attacks. We
Principles of a Computer Immune System
, 1997
"... Natural immune systems provide a rich source of inspiration for computer security in the age of the Internet. Immune systems have many features that are desirable for the imperfect, uncontrolled, and open environments in which most computers currently exist. These include distributability, diversity ..."
Abstract
-
Cited by 102 (6 self)
- Add to MetaCart
Natural immune systems provide a rich source of inspiration for computer security in the age of the Internet. Immune systems have many features that are desirable for the imperfect, uncontrolled, and open environments in which most computers currently exist. These include distributability
Advances in artificial immune systems
- IEEE Computational Intelligence Magazine
, 2006
"... The biological immune system is a robust, complex, adaptive system that defends the body from foreign pathogens. It is able to categorize all cells (or molecules) within the body as self-cells or non-self cells. It does this with the help of a distributed task force that has the intelligence to take ..."
Abstract
-
Cited by 59 (3 self)
- Add to MetaCart
The biological immune system is a robust, complex, adaptive system that defends the body from foreign pathogens. It is able to categorize all cells (or molecules) within the body as self-cells or non-self cells. It does this with the help of a distributed task force that has the intelligence
On Modelling an Immune System
"... Immune systems of live forms have been an abundant source of inspiration to contemporary computer scientists. Problem solving strategies, stemming from known immune system phenomena, have been successfully applied to challenging problems of modern computing. However, research in artificial immune sy ..."
Abstract
- Add to MetaCart
Immune systems of live forms have been an abundant source of inspiration to contemporary computer scientists. Problem solving strategies, stemming from known immune system phenomena, have been successfully applied to challenging problems of modern computing. However, research in artificial immune
A biologically inspired immune system for computers
- IN PROC. OF THE FOURTH INTERNATIONAL WORKSHOP ON SYNTHESIS AND SIMULATION OF LIVING SYSTEMS, ARTIFICIAL LIFE IV
, 1994
"... Computer viruses are the first and only form of artificial life to have had a measurable impact on society. Currently, they are a relatively manageable nuisance. However, two alarming trends are likely tomake computer viruses a much greater threat. First, the rate at which new viruses are being writ ..."
Abstract
-
Cited by 133 (0 self)
- Add to MetaCart
written is high, and accelerating. Second, the trend towards increasing interconnectivity and interoperability among computers will enable computer viruses and worms to spread much more rapidly than they do today. To address these problems, we have designed an immune system for computers and computer
Immune system
- Cannabis and cannabinoids: Pharmacology, toxicology and therapeutic potential
"... Pleuronectiformes) from several estuarine ..."
Information Immune Systems
- GRAFT
, 2002
"... Many people are exposed to more information than they can process eectively. We describe an approach to building an information immune system that eliminates undesirable information before it reaches the user. This approach ..."
Abstract
-
Cited by 27 (1 self)
- Add to MetaCart
Many people are exposed to more information than they can process eectively. We describe an approach to building an information immune system that eliminates undesirable information before it reaches the user. This approach
Results 1 - 10
of
22,134