Self-nonself discrimination in a computer

S Forrest, AS Perelson, L Allen… - Proceedings of 1994 …, 1994 - ieeexplore.ieee.org
The problem of protecting computer systems can be viewed generally as the problem of
learning to distinguish self from other. The authors describe a method for change detection …

On computer viral infection and the effect of immunization

C Wang, JC Knight, MC Elder - Proceedings 16th Annual …, 2000 - ieeexplore.ieee.org
Viruses remain a significant threat to modern networked computer systems. Despite the best
efforts of those who develop anti-virus systems, new viruses and new types of virus that are …

Security and privacy in computer systems

WH Ware - Proceedings of the April 18-20, 1967, spring joint …, 1967 - dl.acm.org
With the advent of computer systems which share the resources of the configuration among
several users or several problems, there is the risk that information from one user (or …

Research on immunity-based intrusion detection technology for the Internet of Things

C Liu, J Yang, R Chen, Y Zhang… - … conference on natural …, 2011 - ieeexplore.ieee.org
To detect the security threat in the Internet of Things (IoT), the mechanisms of artificial
immune system are applied to the IoT environment. The application method of immune …

[PDF][PDF] Principles of a computer immune system

A Somayaji, S Hofmeyr, S Forrest - … of the 1997 workshop on New …, 1998 - dl.acm.org
Natural immune systems provide a rich source ofinspiration for computer security in the age
of the Internet. Immune systems have many features that are desirable for the im-perfect …

Cybersecurity

RA Kemmerer - 25th International Conference on Software …, 2003 - ieeexplore.ieee.org
As more business activities are being automated and an increasing number of computers
are being used to store sensitive information, the need for secure computer systems …

A new classifier based on resource limited artificial immune systems

A Watkins, L Boggess - Proceedings of the 2002 Congress on …, 2002 - ieeexplore.ieee.org
This paper presents a new tool for supervised learning, modeled on resource limited
Artificial Immune Systems. A supervised learning system, it is self-regulatory, efficient, and …

Securing web servers using self cleansing intrusion tolerance (SCIT)

AK Bangalore, AK Sood - 2009 Second International …, 2009 - ieeexplore.ieee.org
The number of malware attacks is increasing, Companies have invested millions of dollars
in intrusion detection and intrusion prevention (ID/IP) technologies and products, yet many …

A sense of self for unix processes

S Forrest, SA Hofmeyr, A Somayaji… - … 1996 IEEE symposium …, 1996 - ieeexplore.ieee.org
A method for anomaly detection is introduced in which" normal" is defined by short-range
correlations in a process' system calls. Initial experiments suggest that the definition is stable …

Security risk assessment in electronic data processing systems

RH Courtney Jr - Proceedings of the June 13-16, 1977, national …, 1977 - dl.acm.org
Concern for the safety of a data processing facility and the data within it should result in the
selection of such security measures, including insurance, as are appropriate to bringing the …