咨询与建议

限定检索结果

文献类型

  • 43 篇 会议
  • 18 篇 期刊文献

馆藏范围

  • 61 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 58 篇 工学
    • 49 篇 计算机科学与技术...
    • 15 篇 电气工程
    • 10 篇 控制科学与工程
    • 6 篇 信息与通信工程
    • 6 篇 软件工程
    • 3 篇 电子科学与技术(可...
    • 2 篇 机械工程
    • 2 篇 仪器科学与技术
    • 1 篇 力学(可授工学、理...
    • 1 篇 材料科学与工程(可...
    • 1 篇 生物医学工程(可授...
    • 1 篇 网络空间安全
  • 10 篇 管理学
    • 9 篇 管理科学与工程(可...
    • 1 篇 公共管理
  • 6 篇 理学
    • 3 篇 数学
    • 3 篇 生物学
    • 1 篇 系统科学
  • 2 篇 医学
    • 1 篇 基础医学(可授医学...
    • 1 篇 临床医学
  • 1 篇 法学
    • 1 篇 法学
  • 1 篇 农学

主题

  • 61 篇 dendritic cell a...
  • 18 篇 danger theory
  • 16 篇 artificial immun...
  • 11 篇 artificial immun...
  • 7 篇 intrusion detect...
  • 7 篇 anomaly detectio...
  • 5 篇 classification
  • 5 篇 genetic algorith...
  • 4 篇 artificial immun...
  • 3 篇 malware
  • 3 篇 ids
  • 3 篇 immune system
  • 2 篇 cyber security
  • 2 篇 fault diagnosis
  • 2 篇 immersive virtua...
  • 2 篇 behavioural dete...
  • 2 篇 signal categoris...
  • 2 篇 state awareness
  • 2 篇 netflow protocol
  • 2 篇 cyber-physical s...

机构

  • 4 篇 northumbria univ...
  • 3 篇 northumbria univ...
  • 3 篇 univ nottingham ...
  • 2 篇 sathyabama univ ...
  • 2 篇 minist def def s...
  • 2 篇 xiamen univ sch ...
  • 2 篇 school of comput...
  • 2 篇 wuhan univ comp ...
  • 2 篇 cuny city coll d...
  • 2 篇 inst super gest ...
  • 1 篇 univ portsmouth ...
  • 1 篇 college of compu...
  • 1 篇 nagarjuna coll e...
  • 1 篇 univ nottingham ...
  • 1 篇 univ manouba nat...
  • 1 篇 hsiuping inst te...
  • 1 篇 pukyong natl uni...
  • 1 篇 south cent univ ...
  • 1 篇 guangdong prov k...
  • 1 篇 univ northumbria...

作者

  • 8 篇 yang longzhi
  • 7 篇 elisa noe
  • 5 篇 greensmith julie
  • 4 篇 chao fei
  • 3 篇 chelly zeineb
  • 3 篇 naik nitin
  • 3 篇 ou chung-ming
  • 3 篇 elouedi zied
  • 2 篇 abu bakar azural...
  • 2 篇 mohsin mohamad f...
  • 2 篇 saadawi tarek
  • 2 篇 lokesh m. r.
  • 2 篇 igbe obinna
  • 2 篇 ajayi oluwaseyi
  • 2 篇 el-alfy el-sayed...
  • 2 篇 liang yiwen
  • 2 篇 kumaraswamy y. s...
  • 2 篇 aickelin uwe
  • 2 篇 hamdan abdul raz...
  • 2 篇 liu sai

语言

  • 60 篇 英文
  • 1 篇 中文
检索条件"主题词=Dendritic Cell Algorithm"
61 条 记 录,以下是51-60 订阅
排序:
Securing the Internet of Things with Responsive Artificial Immune Systems  15
Securing the Internet of Things with Responsive Artificial I...
收藏 引用
17th Genetic and Evolutionary Computation Conference (GECCO)
作者: Greensmith, Julie Univ Nottingham Sch Comp Sci Nottingham NG8 1BB England
The Internet of Things is a network of 'smart' objects, transforming everyday objects into entities which can measure, sense and understand their environment. The devices are uniquely identifiable, rely on nea... 详细信息
来源: 评论
An Efficient Botnet Detection System for P2P Botnet
An Efficient Botnet Detection System for P2P Botnet
收藏 引用
International Conference on Wireless Communications, Signal Processing and Networking
作者: M. Thangapandiyan P. M. Rubesh Anand Department of Electronics and Communication Engineering Hindustan University Chennai India
Peer-to-Peer (P2P) botnets are exploited by the botmasters for their resiliency against the take down efforts. As the modern botnets are stealthier, the traditional botnet detection approaches are not suitable for the... 详细信息
来源: 评论
The Designation of Bio-Inspired Intrusion Detection System Model in Cloud Computing Based on Machine Learning
The Designation of Bio-Inspired Intrusion Detection System M...
收藏 引用
2015 International Conference on Automation,Mechanical Control and Computational Engineering(AMCCE 2015)
作者: Yufei Ge Hong Liang Lin Chen Qian Zhang College of Computer and Communication Engineering China University of Petroleum
The paper proposed a new model by applying bio-inspired theory into intrusion detection system in cloud computing. dendritic cell algorithm(DCA) based on Danger Theory get involved in the model designation in allusion... 详细信息
来源: 评论
Outbreak detection model based on danger theory
收藏 引用
APPLIED SOFT COMPUTING 2014年 第0期24卷 612-622页
作者: Mohsin, Mohamad Farhan Mohamad Abu Bakar, Azuraliza Hamdan, Abdul Razak Univ Kebangsaan Malaysia Fac Sci & Informat Technol Ctr Artificial Intelligence Technol Data Mining & Optimizat Res Grp Bangi Selangor Malaysia
In outbreak detection, one of the key issues is the need to deal with the weakness of early outbreak signals because this causes the detection model to have has less capability in terms of robustness when unseen outbr... 详细信息
来源: 评论
Further Exploration of the Hybrid Fuzzy-Rough dendritic cell Immune Classifier
Further Exploration of the Hybrid Fuzzy-Rough Dendritic Cell...
收藏 引用
4th IEEE International Conference on E-Health and Bioengineering (EHB)
作者: Chelly, Zeineb Elouedi, Zied Inst Super Gest Tunis LARODEC Tunis Tunisia
The performance of the Fuzzy-Rough dendritic cell immune algorithm relies on its data pre-processing phase which is based on the use of Rough Set Theory (RST). However, the developed approach presents an information l... 详细信息
来源: 评论
Host-based intrusion detection systems adapted from agent-based artificial immune systems
收藏 引用
NEUROCOMPUTING 2012年 88卷 78-86页
作者: Ou, Chung-Ming Kainga Univ Dept Informat Management Luchu 338 Taiwan
Agent-based artificial immune system (ABAIS) is adopted to intrusion detection system (IDS). An agent-based IDS (ABIDS) inspired by the danger theory of human immune system is proposed. Multiple agents are embedded to... 详细信息
来源: 评论
Intrusion Detection Systems Adapted from Agent-based Artificial Immune Systems
Intrusion Detection Systems Adapted from Agent-based Artific...
收藏 引用
IEEE International Conference on Fuzzy Systems (FUZZ 2011)
作者: Ou, Chung-Ming Wang, Yao-Tien Ou, C. R. Kainan Univ Dept Informat Management Luchu 33857 Taiwan Hungkuang Univ Dept Comp Sci & Informat Engn Taichung Taiwan Hsiuping Inst Technol Dept Elect Engn Taichung Taiwan
Agent-based artificial immune system (ABAIS) is applied to intrusion detection systems (IDS). A multiagent-based IDS (ABIDS) inspired by the danger theory of human immune system is proposed. The intelligence behind AB... 详细信息
来源: 评论
Classifying in the Presence of Uncertainty: A DCA Perspective
收藏 引用
9th International Conference on Artificial Immune Systems (ICARIS 2010)
作者: Oates, Robert Kendall, Graham Garibaldi, Jonathan M. Univ Nottingham Sch Comp Sci Nottingham NG7 2RD England
The dendritic cell algorithm is often presented as an immune-inspired one class classifier. Recently the dendritic cell algorithm has been criticised as its current decision making stage has many serious mathematical ... 详细信息
来源: 评论
A Sense of 'Danger' for Windows Processes
A Sense of 'Danger' for Windows Processes
收藏 引用
8th International Conference on Artificial Immune Systems
作者: Manzoor, Salman Shafiq, M. Zubair Tabish, S. Momina Farooq, Muddassar NUCES FAST Next Generat Intelligent Networks Res Ctr NexGIN Islamabad 44000 Pakistan
The sophistication of modern computer malware demands run-time malware detection strategies which are not only efficient but also robust to obfuscation and evasion attempts. In this paper;we investigate the suitabilit... 详细信息
来源: 评论
Improving the reliability of real-time embedded systems using innate immune techniques
收藏 引用
EVOLUTIONARY INTELLIGENCE 2008年 第2期1卷 113-132页
作者: Lay, Nicholas Bate, Iain Univ York Dept Comp Sci York N Yorkshire England
Previous work has shown that immune-inspired techniques have good potential for solving problems associated with the development of real- time embedded systems (RTES), where for various reasons traditional real-time d... 详细信息
来源: 评论