[PDF][PDF] Computer immunology

S Forrest, SA Hofmeyr, A Somayaji - Communications of the ACM, 1997 - dl.acm.org
… applying ideas from immunology to today’s computer security … The analogy between
immunology and computer security is … the quest for computer security, the analogy with …

Computer immunology

S Forrest, C Beauchemin - Immunological reviews, 2007 - Wiley Online Library
This review describes a body of work on computational immune systems that behave
analogously to the natural immune system. These artificial immune systems (AIS) simulate the …

Computer Immunology.

M Burgess - LISA, 1998 - usenix.org
computer systems are fragile and unreliable. Human beings are involved in the care and repair
of computer … It will be necessary to mimic such systems if our future computer systems are …

[PDF][PDF] Computer immunology

LWY Lau - 2002 - priv.gg
… The idea of a layered approach to computer security has long existed before the concept
of computer immunology. Currently, the multi-layered protection approach is already …

Computational immunology meets bioinformatics: the use of prediction tools for molecular binding in the simulation of the immune system

N Rapin, O Lund, M Bernaschi, F Castiglione - PloS one, 2010 - journals.plos.org
… to study the immune response by means of computer simulation. The first level is a … , have
purposefully been kept separate in the computer code. This implies that a novel method for …

Computational immunology: The coming of age

N Petrovsky, V Brusic - Immunology and cell biology, 2002 - Wiley Online Library
… To overcome these problems, we used an artificial neural network (ANN) computer model
to study peptide binding to human TAP and its relationship with MHC class I binding. After …

The evolution of mathematical immunology

Y Louzoun - Immunological reviews, 2007 - Wiley Online Library
… , and unlimited computing power, immunological modeling shifted toward … immunology are
now focused around the concepts of high-throughput measurements and system immunology

[图书][B] Computational immunology: models and tools

J Bassaganya-Riera - 2015 - books.google.com
… analytics and modeling technologies, and computer algorithms for studying mechanisms of
… from traditional immunology research to the iterative systems immunology cycle, computer

An immunity-based technique to characterize intrusions in computer networks

D Dasgupta, F González - IEEE Transactions on evolutionary …, 2002 - ieeexplore.ieee.org
… in computing may be considered as analogous to the immunity in natural systems. In computing,
… The idea of using immunological principles in computer security [8], [10], [19], [20] has …

A computer model of cellular interactions in the immune system

F Celada, PE Seiden - Immunology today, 1992 - cell.com
The power of modern computers allows the modeling and … , is rich enough to allow computer
experiments to be used as … can be performed in a computer. These experiments will have …