共 12 条
[1]
[Anonymous], 1988, COMPUT SECUR
[2]
[Anonymous], 2001, The Immune System in Health and Disease
[3]
Cohen F., 1987, Computers & Security, V6, P22, DOI 10.1016/0167-4048(87)90122-2
[4]
DENNING DE, 1987, IEEE ENG, V2, P118
[5]
An immunological approach to change detection: Algorithms, analysis and implications
[J].
1996 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
1996,
:110-119
[6]
Forrest S., 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy (Cat. No.94CH3444-7), P202, DOI 10.1109/RISP.1994.296580
[7]
A sense of self for unix processes
[J].
1996 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
1996,
:120-128
[8]
Kephart J.O., 1995, P INT JOINT C ART
[10]
Ko C., 1994, Proceedings. 10th Annual Computer Security Applications Conference (Cat. No.94TH8032), P134, DOI 10.1109/CSAC.1994.367313