Publication: An overview of apoptosis for computer security
dc.Conferencecode | 74115 | |
dc.Conferencedate | 26 August 2008 through 29 August 2008 | |
dc.Conferencelocation | Kuala Lumpur | |
dc.Conferencename | International Symposium on Information Technology 2008, ITSim | |
dc.citedby | 3 | |
dc.contributor.affiliations | Faculty of Science and Technology | |
dc.contributor.affiliations | Universiti Sains Islam Malaysia (USIM) | |
dc.contributor.affiliations | University of Bradford | |
dc.contributor.author | Saudi M.M. | en_US |
dc.contributor.author | Woodward M. | en_US |
dc.contributor.author | Cullen A.J. | en_US |
dc.contributor.author | Noor H.M. | en_US |
dc.date.accessioned | 2024-05-29T01:55:07Z | |
dc.date.available | 2024-05-29T01:55:07Z | |
dc.date.issued | 2008 | |
dc.description.abstract | Immune system is essential to human body as it protects our bodies from pathogens in an orchestrated manner. From a computational viewpoint, the immune system has much to offer by way of inspiration. Recently, there has been growing interest in the use of natural immune system as inspiration for the creation novel approaches to computational problem. This field of research is referred as Immunological Computation or Artificial Immune System. The use of artificial system computer security is an appealing concept for two reasons. Firstly, the human immune system provides human body with a high level protection from invading pathogens in robust manner. Secondly, current techniques used in computer security are not able to cope with the dynamic and increasingly complex nature of computer systems and their security. This paper introduces the concept of apoptosis for computer security. This term is borrowed from cell biology and designates the programmed cell death. � 2008 IEEE. | |
dc.description.nature | Final | en_US |
dc.description.sponsorship | IEEE | |
dc.identifier.ArtNo | 4631907 | |
dc.identifier.doi | 10.1109/ITSIM.2008.4631907 | |
dc.identifier.isbn | 9781420000000 | |
dc.identifier.scopus | 2-s2.0-57449099347 | |
dc.identifier.uri | https://www.scopus.com/inward/record.uri?eid=2-s2.0-57449099347&doi=10.1109%2fITSIM.2008.4631907&partnerID=40&md5=d5e3a9bfa216835914a8244137eb2da6 | |
dc.identifier.uri | https://oarep.usim.edu.my/handle/123456789/9632 | |
dc.identifier.volume | 3 | |
dc.language | English | |
dc.language.iso | en_US | |
dc.relation.ispartof | Proceedings - International Symposium on Information Technology 2008, ITSim | |
dc.source | Scopus | |
dc.subject | Cell death | en_US |
dc.subject | Cytology | en_US |
dc.subject | Immunology | en_US |
dc.subject | Information technology | en_US |
dc.subject | Security systems | en_US |
dc.subject | Apoptosis | en_US |
dc.subject | Artificial Immune Systems | en_US |
dc.subject | Artificial systems | en_US |
dc.subject | Cell biologies | en_US |
dc.subject | Complex natures | en_US |
dc.subject | Computational problems | en_US |
dc.subject | Computer securities | en_US |
dc.subject | Current techniques | en_US |
dc.subject | Human bodies | en_US |
dc.subject | Human immune systems | en_US |
dc.subject | Immune systems | en_US |
dc.subject | Natural immune systems | en_US |
dc.subject | Programmed cell deaths | en_US |
dc.subject | Computer systems | en_US |
dc.title | An overview of apoptosis for computer security | |
dc.type | Conference Paper | en_US |
dspace.entity.type | Publication |