咨询与建议

限定检索结果

文献类型

  • 43 篇 会议
  • 18 篇 期刊文献

馆藏范围

  • 61 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 58 篇 工学
    • 49 篇 计算机科学与技术...
    • 15 篇 电气工程
    • 10 篇 控制科学与工程
    • 6 篇 信息与通信工程
    • 6 篇 软件工程
    • 3 篇 电子科学与技术(可...
    • 2 篇 机械工程
    • 2 篇 仪器科学与技术
    • 1 篇 力学(可授工学、理...
    • 1 篇 材料科学与工程(可...
    • 1 篇 生物医学工程(可授...
    • 1 篇 网络空间安全
  • 10 篇 管理学
    • 9 篇 管理科学与工程(可...
    • 1 篇 公共管理
  • 6 篇 理学
    • 3 篇 数学
    • 3 篇 生物学
    • 1 篇 系统科学
  • 2 篇 医学
    • 1 篇 基础医学(可授医学...
    • 1 篇 临床医学
  • 1 篇 法学
    • 1 篇 法学
  • 1 篇 农学

主题

  • 61 篇 dendritic cell a...
  • 18 篇 danger theory
  • 16 篇 artificial immun...
  • 11 篇 artificial immun...
  • 7 篇 intrusion detect...
  • 7 篇 anomaly detectio...
  • 5 篇 classification
  • 5 篇 genetic algorith...
  • 4 篇 artificial immun...
  • 3 篇 malware
  • 3 篇 ids
  • 3 篇 immune system
  • 2 篇 cyber security
  • 2 篇 fault diagnosis
  • 2 篇 immersive virtua...
  • 2 篇 behavioural dete...
  • 2 篇 signal categoris...
  • 2 篇 state awareness
  • 2 篇 netflow protocol
  • 2 篇 cyber-physical s...

机构

  • 4 篇 northumbria univ...
  • 3 篇 northumbria univ...
  • 3 篇 univ nottingham ...
  • 2 篇 sathyabama univ ...
  • 2 篇 minist def def s...
  • 2 篇 xiamen univ sch ...
  • 2 篇 school of comput...
  • 2 篇 wuhan univ comp ...
  • 2 篇 cuny city coll d...
  • 2 篇 inst super gest ...
  • 1 篇 univ portsmouth ...
  • 1 篇 college of compu...
  • 1 篇 nagarjuna coll e...
  • 1 篇 univ nottingham ...
  • 1 篇 univ manouba nat...
  • 1 篇 hsiuping inst te...
  • 1 篇 pukyong natl uni...
  • 1 篇 south cent univ ...
  • 1 篇 guangdong prov k...
  • 1 篇 univ northumbria...

作者

  • 8 篇 yang longzhi
  • 7 篇 elisa noe
  • 5 篇 greensmith julie
  • 4 篇 chao fei
  • 3 篇 chelly zeineb
  • 3 篇 naik nitin
  • 3 篇 ou chung-ming
  • 3 篇 elouedi zied
  • 2 篇 abu bakar azural...
  • 2 篇 mohsin mohamad f...
  • 2 篇 saadawi tarek
  • 2 篇 lokesh m. r.
  • 2 篇 igbe obinna
  • 2 篇 ajayi oluwaseyi
  • 2 篇 el-alfy el-sayed...
  • 2 篇 liang yiwen
  • 2 篇 kumaraswamy y. s...
  • 2 篇 aickelin uwe
  • 2 篇 hamdan abdul raz...
  • 2 篇 liu sai

语言

  • 60 篇 英文
  • 1 篇 中文
检索条件"主题词=Dendritic Cell Algorithm"
61 条 记 录,以下是11-20 订阅
排序:
An upper and lower CUSUM for signal normalization in the dendritic cell algorithm
收藏 引用
EVOLUTIONARY INTELLIGENCE 2016年 第1-2期9卷 37-51页
作者: Mohsin, Mohamad Farhan Mohamad Hamdan, Abdul Razak Abu Bakar, Azuraliza Univ Kebangsaan Malaysia Fac Informat Sci & Technol Ctr Artificial Intelligence Technol Data Min & Optimizat Res Grp Bangi 43600 Selangor Malaysia Univ Utara Malaysia Coll Arts & Sci Sch Comp Sintok Kedah Malaysia
Signal normalization is a part of signal formalization which is a vital data pre-processing constraint required for the functioning of the dendritic cell algorithm. In existing applications, most normalization algorit... 详细信息
来源: 评论
Theoretical formulation and analysis of the deterministic dendritic cell algorithm
收藏 引用
BIOSYSTEMS 2013年 第2期111卷 127-135页
作者: Gu, Feng Greensmith, Julie Aickelin, Uwe Univ Leeds Sch Comp Leeds LS2 9JT W Yorkshire England Univ Nottingham Sch Comp Sci Nottingham NG8 1BB England
As one of the emerging algorithms in the field of artificial immune systems (AIS), the dendritic cell algorithm (DCA) has been successfully applied to a number of challenging real-world problems. However, one criticis... 详细信息
来源: 评论
State awareness towards Resiliency in Cyber-Physical System A Modified Danger Theory based Deterministic dendritic cell algorithm Approach
State awareness towards Resiliency in Cyber-Physical System ...
收藏 引用
IEEE International Conference on Computer Graphics, Vision and Information Security (CGVIS)
作者: Lokesh, M. R. Kumaraswamy, Y. S. Sathyabama Univ Dept Comp Sci & Engn Madras Tamil Nadu India Nagarjuna Coll Engn & Technol Dept Comp Sci & Engn Devanahalli Bengaluru India
State awareness plays major role in developing resiliency in cyber-physical system where the environment is diverse in nature. Cyber-physical system is modeled with Multi Agent Paradigm and biological inspired Danger ... 详细信息
来源: 评论
Result-Controllable dendritic cell algorithm
Result-Controllable Dendritic Cell Algorithm
收藏 引用
10th International Conference on Intelligent Computing (ICIC)
作者: Yuan, Song Zhang, He Wuhan Univ Sci & Technol Coll Comp Sci & Technol Wuhan Peoples R China
To realize that the false positive rate and false negative rate can be adjusted and improve the detection accuracy of the classical dendritic cell algorithm which contains various uncertain elements, the concept of Te... 详细信息
来源: 评论
Method of Locating Anomaly Source in Software System Based on dendritic cell algorithm
Method of Locating Anomaly Source in Software System Based o...
收藏 引用
International Conference on Mechatronics Engineering and Computing Technology (ICMECT)
作者: Liu Sai Ke Jie Wuhan Univ Comp Sch Wuhan 430072 Peoples R China
The method of anomaly detection in traditional software system cannot locate anomaly or find the lack of abnormal source accurately and timely. With regard to this deficiency, this paper presents an improved algorithm... 详细信息
来源: 评论
Denial of Service Attack Detection using dendritic cell algorithm  8
Denial of Service Attack Detection using Dendritic Cell Algo...
收藏 引用
8th IEEE Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON)
作者: Igbe, Obinna Ajayi, Oluwaseyi Saadawi, Tarek CUNY City Coll Dept Elect Engn New York NY 10031 USA
Denial-of-service (DoS) and distributed denial-of-service (DDoS) is one of the most popular and easy-to-implement attacks targeting online systems and networks. This paper presents a system for detecting DoS attacks i... 详细信息
来源: 评论
Using dendritic cell algorithm to Detect the Resource Consumption Attack over MANET
Using Dendritic Cell Algorithm to Detect the Resource Consum...
收藏 引用
2nd International Conference on Software Engineering and Computing Systems (ICSECS 2011)
作者: Abdelhaq, Maha Hassan, Rosilah Alsaqour, Raed Univ Kebangsaan Malaysia Sch Comp Sci Fac Informat Sci & Technol Bangi 43600 Selangor Darul Malaysia
Artificial Immune Systems (AISs) and Mobile Ad Hoc Networks (MANETs) are two up to date attractive technologies. AIS is utilized to introduce efficient intrusion detection algorithms to secure both host based and netw... 详细信息
来源: 评论
Immune Inspired dendritic cell algorithm for Stock Price Manipulation Detection
Immune Inspired Dendritic Cell Algorithm for Stock Price Man...
收藏 引用
Intelligent Systems Conference (IntelliSys)
作者: Rizvi, Baqar Belatreche, Ammar Bouridane, Ahmed Univ Northumbria Newcastle Newcastle Upon Tyne Tyne & Wear England
Stock price manipulation is a term given to illicit or unlawful activities that tries to artificially impact a security's price. This alters the prime objective of transaction of stocks legally. This research pres... 详细信息
来源: 评论
Signal Categorisation for dendritic cell algorithm Using GA with Partial Shuffle Mutation  19th
Signal Categorisation for Dendritic Cell Algorithm Using GA ...
收藏 引用
19th Annual UK Workshop on Computational Intelligence (UKCI)
作者: Elisa, Noe Yang, Longzhi Chao, Fei Northumbria Univ Dept Comp & Informat Sci Newcastle Upon Tyne NE1 8ST Tyne & Wear England Xiamen Univ Sch Informat Sci & Engn Cognit Sci Dept Xiamen Peoples R China
dendritic cell algorithm (DCA) is a bio-inspired system which was specifically developed for anomaly detection problems. In its preprocessing phase, the conventional DC requires domain or expert knowledge to manually ... 详细信息
来源: 评论
Migration Threshold Tuning in the Deterministic dendritic cell algorithm  8th
Migration Threshold Tuning in the Deterministic Dendritic Ce...
收藏 引用
8th International Conference on the Theory and Practice of Natural Computing (TPNC)
作者: Greensmith, Julie Univ Nottingham Sch Comp Sci Nottingham NG8 1BB England
In this paper we explore the sensitivity of the migration threshold parameter in the Deterministic dendritic cell algorithm (dDCA), one of the four main types of Artificial Immune System. This is with a view to the fu... 详细信息
来源: 评论