Publication:
An overview of apoptosis for computer security

dc.Conferencecode74115
dc.Conferencedate26 August 2008 through 29 August 2008
dc.ConferencelocationKuala Lumpur
dc.ConferencenameInternational Symposium on Information Technology 2008, ITSim
dc.citedby3
dc.contributor.affiliationsFaculty of Science and Technology
dc.contributor.affiliationsUniversiti Sains Islam Malaysia (USIM)
dc.contributor.affiliationsUniversity of Bradford
dc.contributor.authorSaudi M.M.en_US
dc.contributor.authorWoodward M.en_US
dc.contributor.authorCullen A.J.en_US
dc.contributor.authorNoor H.M.en_US
dc.date.accessioned2024-05-29T01:55:07Z
dc.date.available2024-05-29T01:55:07Z
dc.date.issued2008
dc.description.abstractImmune system is essential to human body as it protects our bodies from pathogens in an orchestrated manner. From a computational viewpoint, the immune system has much to offer by way of inspiration. Recently, there has been growing interest in the use of natural immune system as inspiration for the creation novel approaches to computational problem. This field of research is referred as Immunological Computation or Artificial Immune System. The use of artificial system computer security is an appealing concept for two reasons. Firstly, the human immune system provides human body with a high level protection from invading pathogens in robust manner. Secondly, current techniques used in computer security are not able to cope with the dynamic and increasingly complex nature of computer systems and their security. This paper introduces the concept of apoptosis for computer security. This term is borrowed from cell biology and designates the programmed cell death. � 2008 IEEE.
dc.description.natureFinalen_US
dc.description.sponsorshipIEEE
dc.identifier.ArtNo4631907
dc.identifier.doi10.1109/ITSIM.2008.4631907
dc.identifier.isbn9781420000000
dc.identifier.scopus2-s2.0-57449099347
dc.identifier.urihttps://www.scopus.com/inward/record.uri?eid=2-s2.0-57449099347&doi=10.1109%2fITSIM.2008.4631907&partnerID=40&md5=d5e3a9bfa216835914a8244137eb2da6
dc.identifier.urihttps://oarep.usim.edu.my/handle/123456789/9632
dc.identifier.volume3
dc.languageEnglish
dc.language.isoen_US
dc.relation.ispartofProceedings - International Symposium on Information Technology 2008, ITSim
dc.sourceScopus
dc.subjectCell deathen_US
dc.subjectCytologyen_US
dc.subjectImmunologyen_US
dc.subjectInformation technologyen_US
dc.subjectSecurity systemsen_US
dc.subjectApoptosisen_US
dc.subjectArtificial Immune Systemsen_US
dc.subjectArtificial systemsen_US
dc.subjectCell biologiesen_US
dc.subjectComplex naturesen_US
dc.subjectComputational problemsen_US
dc.subjectComputer securitiesen_US
dc.subjectCurrent techniquesen_US
dc.subjectHuman bodiesen_US
dc.subjectHuman immune systemsen_US
dc.subjectImmune systemsen_US
dc.subjectNatural immune systemsen_US
dc.subjectProgrammed cell deathsen_US
dc.subjectComputer systemsen_US
dc.titleAn overview of apoptosis for computer security
dc.typeConference Paperen_US
dspace.entity.typePublication

Files

Collections