The immune system provides a rich metaphor for computer security: anomaly detection that works in nature should work for machines. However, early artificial immune system approaches for computer security had only limited success. Arguably, this was due to these artifici... View more
U. Aickelin, J. Greensmith, and J. Twycross. Immune System Approaches to Intrusion Detection - A Review. In Proc. of the 3rd International Conference on Artificial Immune Systems, LNCS 3239, pages 316-329, Catania, Italy, 2004.
J. P. Anderson. Computer Security Threat Monitoring and Surveillance. James P. Anderson Co., Fort Washington, PA, 1980.
S. Axelsson. Intrusion Detection Systems: A Survey and Taxonomy. Technical Report 99-15, Department of Computer Engineering, Chalmers University, March 2000.
R. Bace and P. Mell. Intrusion Detection Systems. Technical Report NIST Computer Science Special Reports SP-800-31, National Institute of Standards and Technology, November 2001.
J. Balthrop, F. Esponda, S. Forrest, and M. Glickman. Coverage and generaliszation in an artificial immune system. Proc. of the 4th Annual Genetic and Evolutionary Computation Conference, pages 3-10, 2002.
D. P. Bovet and M. Cesati. Understanding the Linux Kernel. O'Reilly and Associates, 2002.
Bugtraq: statdx2 - Linux rpc.statd revisited. Published online at http://seclists.org/lists/bugtraq/2000/Oct/0170.html, 2000.
B. Cheswick. An Evening with Berferd in which a cracker is Lured, Endured, and Studied. In Proc. of the 1st Winter USENIX Conference, pages 163-174, San Francisco, CA, January 1992.
D. Dasgupta. Advances in artificial immune systems. IEEE Computational Intelligence Magazine, 1 (4):40-49, 2006.
D. Dasgupta. Artificial Immune Systems and Their Applications. Springer Verlag, 1999.