Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Forrest S. Hofmeyr S. Somayaji A. Computer immunology. Communications of the ACM, 40(10), (1997).
Shortman K. Caux C. Dendritic cell development: multiple pathways to nature’s adjuvants. Stem Cells, 15:409-419, (1997).
Shortman K. Caux C. Dendritic cells and t lymphocytes: developmental and functional interactions. Ciba Found Symp, 204:130-141, (1997).
Dasgupta D. An overview of artificial immune systems. Artificial Immune Systems and Their Applications, (1999).
deCastro L. N. and Timmis J. Artificial immune systems a new computational intelligence approach. Springer, (2002).
Satthaporn S. EreminO. Dendritic cells (i) : biological functions. Journal of the Royal College of Surgeons of Edinburgh : Scientific Review, 46(1), (2001).
Steven Hofmeyr. An immunological model of distributed detection and its application to computer security. PhD thesis, (1999).
Martien L. Kapsenberg. Dendritic-cell control of pathogen-driven t-cell polarization. Nature Reviews in Immunology, 3:984-993, December (2003).
Williamson M. M. Throttling viruses. restricting propagation to defeat malicious mobile code. Technical Report of HP Laboratories Bristol,, HPL-2002-172, 2002.
Anderson C. Matzinger P. Danger: The view from the bottom of the cliff. Seminars in Immunology, 12(3):231-238, 2000.
Matzinger P. An innate sense of danger. Seminars in Immunology, 10(5):399-415,(1998).
Matzinger P. The danger model: A renewed sense of self. Science, 296:301-305, (2002).
G. J. et al. Randolph. Differentiation of monocytes into dendritic cells in a model of transendothelial trafficking see comments. Science, 282:480-483, (1998).
Percus Jerome K. Ora E. Alan S. Predicting the size of the t-cell receptor and antibody combining region from consideration of efficient self non-self discrimination. Proceedings of the National Academy of Sciences of the United States of America, 90:1691-1695, (1993).
Greensmith J. Aickelin U. Jamie T. Detecting danger. applying a novel immunological concept to intrusion detection systems. 6th International Conference in Design and Manufacture, (2004).
Aickelin U. and Cayzer S. The danger theory and its application to artificial immune systems. In proceedings of The First International Conference on Artificial Immune Systems (ICARIS 2002), pages 141-148, (2002).
Jamie T. Aickelin U. Towards a conceptual framework for innate immunity. Proceedings of the 4th International Conference on Artificial Immune Systems, (2004).
William R. Heath Jose A. Villadangos. No driving without a license. Nature Immunology, 6(2):125-126, (2005).
Jansen W. Intrusion detection with mobile agents. Computer Communications, 25(15),(2002).
Riley G. F. Sharif M. I. Lee W. Simulating internet worms. Proceedings of IEEE/ACM MASCOTS 2004, (2004).
Ki-Won Yeom and Ji-Hyung Park. An immune system inspired approach of collaborative intrusion detection system using mobile agents in wireless adhoc network. Lecture Notes in Artificial Intelligence, 3802:204-211, (2005).
Steinman R. Cohn Z. Identification of a novel cell type in peripheral lymphoid organs of mice. The Journal of Experimental Medicine, 137:1142-1162, (1973).
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Yeom, KW. (2007). Immune-inspired Algorithm for Anomaly Detection. In: Nedjah, N., Abraham, A., Mourelle, L.d.M. (eds) Computational Intelligence in Information Assurance and Security. Studies in Computational Intelligence, vol 57. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-71078-3_5
Download citation
DOI: https://doi.org/10.1007/978-3-540-71078-3_5
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-71077-6
Online ISBN: 978-3-540-71078-3
eBook Packages: EngineeringEngineering (R0)