作者
Stephanie Forrest, Steven A Hofmeyr, Anil Somayaji
发表日期
1997/10/1
期刊
Communications of the ACM
卷号
40
期号
10
页码范围
88-96
出版商
ACM
简介
IMAGE COURTESY OF THOMAS SMITH AND TIMOTHY BAKER AT PURDUE UNIVERSITY plex set of events takes place, usually resulting in elimination of the antigen by scavenger cells called macrophages.(How antigen is bound and cleared depends on the type of detectors involved.) Figure 1 outlines this highly simplified view of the immune system. A striking feature of the immune system is that the processes by which it generates detectors, identifies and eliminates foreign material, and remembers the patterns of previous infections are all highly parallel and distributed. This is one reason immune system mechanisms are so complicated, but it also makes them highly robust against failure of individual components and to attacks on the immune system itself. The analogy between computer security problems and biological processes was recognized as early as 1987, when the term “computer virus’’was …
引用总数
19971998199920002001200220032004200520062007200820092010201120122013201420152016201720182019202020212022202320246183839516078821061109780677067424439163421191511181364
学术搜索中的文章
S Forrest, SA Hofmeyr, A Somayaji - Communications of the ACM, 1997