The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Jungwon Kim: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Uwe Aickelin, Peter J. Bentley, Steve Cayzer, Jungwon Kim, Julie McLeod
    Danger Theory: The Link between AIS and IDS? [Citation Graph (0, 0)][DBLP]
    ICARIS, 2003, pp:147-155 [Conf]
  2. Jungwon Kim, William O. Wilson, Uwe Aickelin, Julie McLeod
    Cooperative Automated Worm Response and Detection ImmuNe ALgorithm(CARDINAL) Inspired by T-Cell Immunity and Tolerance. [Citation Graph (0, 0)][DBLP]
    ICARIS, 2005, pp:168-181 [Conf]
  3. Jungwon Kim, Peter J. Bentley, Christian Wallenta, Mohamed Ahmed, Stephen Hailes
    Danger Is Ubiquitous: Detecting Malicious Activities in Sensor Networks Using the Dendritic Cell Algorithm. [Citation Graph (0, 0)][DBLP]
    ICARIS, 2006, pp:390-403 [Conf]
  4. Jungwon Kim, Peter J. Bentley
    Immune Memory and Gene Library Evolution in the Dynamic Clonal Selection Algorithm. [Citation Graph (0, 0)][DBLP]
    Genetic Programming and Evolvable Machines, 2004, v:5, n:4, pp:361-391 [Journal]

  5. COMIC: a coherent shared memory interface for cell be. [Citation Graph (, )][DBLP]


  6. Design of an artificial immune system as a novel anomaly detector for combating financial fraud in the retail sector. [Citation Graph (, )][DBLP]


  7. Detecting interest cache poisoning in sensor networks using an artificial immune algorithm. [Citation Graph (, )][DBLP]


  8. Danger Theory: The Link between AIS and IDS [Citation Graph (, )][DBLP]


  9. Immune System Approaches to Intrusion Detection - A Review [Citation Graph (, )][DBLP]


  10. Cooperative Automated Worm Response and Detection Immune Algorithm [Citation Graph (, )][DBLP]


  11. Malicious Code Execution Detection and Response Immune System inspired by the Danger Theory [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002