'Malicious Code Execution Detection and Response Immune System inspired by the Danger Theory'
(2005)
Presentation / Conference Contribution
Kim, J., Greensmith, J., Twycross, J., & Aickelin, U. 'Malicious Code Execution Detection and Response Immune System inspired by the Danger Theory'. Presented at Adaptive and Resilient Computing Security Workshop (ARCS-05)
The analysis of system calls is one method employed by anomaly detection systems to recognise malicious code execution. Similarities can be drawn between this process and the behaviour of certain cells belonging to the human immune system, and can be... Read More about 'Malicious Code Execution Detection and Response Immune System inspired by the Danger Theory'.