نتایج جستجو برای: danger theory

تعداد نتایج: 795516  

2005
Jungwon Kim Julie Greensmith Jamie Twycross Uwe Aickelin

The analysis of system calls is one method employed by anomaly detection systems to recognise malicious code execution. Similarities can be drawn between this process and the behaviour of certain cells belonging to the human immune system, and can be applied to construct an artificial immune system. A recently developed hypothesis in immunology, the Danger Theory, states that our immune system ...

2005
Jungwon Kim Julie Greensmith Jamie Twycross Uwe Aickelin

The analysis of system calls is one method employed by anomaly detection systems to recognise malicious code execution. Similarities can be drawn between this process and the behaviour of certain cells belonging to the human immune system, and can be applied to construct an artificial immune system. A recently developed hypothesis in immunology, the Danger Theory, states that our immune system ...

2012
Claire L. Adida David D. Laitin Marie-Anne Valfort

Muslims in France: Identifying a Discriminatory Equilibrium We analyze the assimilation patterns of Muslim immigrants in Western countries with a unique identification strategy. Survey and experimental data collected in France in 2009 reveal that Muslims and rooted French are locked in a sub-optimal equilibrium whereby (i) rooted French exhibit taste-based discrimination against those they are ...

2013
Erik Z. Woody Henry Szechtman

Research indicates that there is a specially adapted, hard-wired brain circuit, the security motivation system, which evolved to manage potential threats, such as the possibility of contamination or predation. The existence of this system may have important implications for policy-making related to security. The system is sensitive to partial, uncertain cues of potential danger, detection of wh...

2012
Mohammad Mahboubian Nur Izura Udzir Shamala Subramaniam Nor Asila Wati Abdul Hamid

One of the most important topics in the field of intrusion detection systems is to find a solution to reduce the overwhelming alerts generated by IDSs in the network. Inspired by danger theory which is one of the most important theories in artificial immune system (AIS) we proposed a complementary subsystem for IDS which can be integrated into any existing IDS models to aggregate the alerts in ...

2013
Ayman Mohamed Mostafa Mohamed H. Abdel-Aziz Ibrahim M. El-Henawy

Database security is considered one of the major computer science research trends because of its importance in maintaining the privacy, integrity, and confidentiality of data. Human immune system is a set of defense mechanisms that can be used to defend the body against diseases caused by pathogens. Artificial immune system is the artificial simulation of human immunity that can be applied to c...

2002
Snežana Bogdanovich Dragana Popović

Large fluctuations of conductivity with time are observed in a low-mobility twodimensional electron system in silicon at low electron densities ns and temperatures. A dramatic increase of the noise power (∝ 1/fα) as ns is reduced below a certain density ng, and a sharp jump of α at ns ≈ ng, are attributed to the freezing of the electron glass at ns = ng. The data strongly suggest that glassy dy...

2008
Nauman Mazhar Muddassar Farooq

AIS-based anomaly detection systems classically utilize the paradigm of self/non-self discrimination. In this approach, an algorithm learns self during a learning phase, therefore, such algorithms do not have the ability to cope with scenarios in which self is continuously changing with time. This situation is encountered once malicious nodes are to be detected in a Mobile Ad Hoc Network (MANET...

Journal: :Nature 1977

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید