咨询与建议

限定检索结果

文献类型

  • 87 篇 期刊文献
  • 84 篇 会议
  • 3 篇 学位论文

馆藏范围

  • 174 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 162 篇 工学
    • 112 篇 计算机科学与技术...
    • 41 篇 电气工程
    • 27 篇 控制科学与工程
    • 16 篇 软件工程
    • 15 篇 信息与通信工程
    • 12 篇 机械工程
    • 10 篇 材料科学与工程(可...
    • 8 篇 仪器科学与技术
    • 6 篇 土木工程
    • 5 篇 建筑学
    • 5 篇 网络空间安全
    • 3 篇 电子科学与技术(可...
    • 3 篇 石油与天然气工程
    • 3 篇 航空宇航科学与技...
    • 2 篇 力学(可授工学、理...
    • 2 篇 生物医学工程(可授...
    • 1 篇 地质资源与地质工...
    • 1 篇 生物工程
    • 1 篇 安全科学与工程
  • 17 篇 理学
    • 6 篇 生物学
    • 5 篇 数学
    • 5 篇 化学
    • 4 篇 物理学
    • 1 篇 系统科学
    • 1 篇 统计学(可授理学、...
  • 17 篇 管理学
    • 17 篇 管理科学与工程(可...
  • 4 篇 医学
    • 2 篇 临床医学
  • 3 篇 经济学
    • 2 篇 应用经济学
  • 2 篇 艺术学
    • 2 篇 设计学(可授艺术学...
  • 1 篇 教育学
    • 1 篇 教育学

主题

  • 174 篇 negative selecti...
  • 69 篇 artificial immun...
  • 29 篇 anomaly detectio...
  • 23 篇 artificial immun...
  • 13 篇 intrusion detect...
  • 11 篇 fault diagnosis
  • 11 篇 fault detection
  • 9 篇 structural healt...
  • 8 篇 detector generat...
  • 7 篇 detector
  • 7 篇 v-detector
  • 6 篇 intrusion detect...
  • 6 篇 hypothesis testi...
  • 5 篇 computer securit...
  • 5 篇 detector generat...
  • 5 篇 clonal selection...
  • 4 篇 optimization
  • 4 篇 differential evo...
  • 4 篇 boundary self
  • 4 篇 i/o request pack...

机构

  • 5 篇 sichuan univ col...
  • 5 篇 sichuan univ col...
  • 5 篇 sichuan univ sch...
  • 5 篇 changzhou univ s...
  • 4 篇 shanghai univ sc...
  • 4 篇 sichuan univ sch...
  • 3 篇 univ elect sci &...
  • 2 篇 univ sci & techn...
  • 2 篇 sichuan univ col...
  • 2 篇 bahmanyar univ k...
  • 2 篇 xiamen univ tech...
  • 2 篇 univ teknol mala...
  • 2 篇 aalto univ inst ...
  • 2 篇 univ teknol mala...
  • 2 篇 shahid bahonar u...
  • 2 篇 koszalin univ te...
  • 2 篇 school of comput...
  • 2 篇 shanghai univ sc...
  • 2 篇 school of comput...
  • 2 篇 dongguan univ te...

作者

  • 15 篇 li tao
  • 6 篇 liu shulin
  • 6 篇 li dong
  • 4 篇 masciotta maria ...
  • 4 篇 barontini albert...
  • 4 篇 amado-mendes pau...
  • 4 篇 he junjiang
  • 4 篇 chavarette fabio...
  • 4 篇 zeng jie
  • 4 篇 chen wen
  • 3 篇 wawryn krzysztof
  • 3 篇 yang chunying
  • 3 篇 ramos luis f.
  • 3 篇 zeng jinquan
  • 3 篇 xu aiqiang
  • 3 篇 wang yunpeng
  • 3 篇 li tingjun
  • 3 篇 li beibei
  • 3 篇 li haibo
  • 3 篇 idris ismaila

语言

  • 166 篇 英文
  • 5 篇 其他
  • 2 篇 土耳其文
  • 1 篇 中文
检索条件"主题词=Negative Selection Algorithm"
174 条 记 录,以下是111-120 订阅
排序:
A malware detection model based on a negative selection algorithm with penalty factor
收藏 引用
Science China(Information Sciences) 2010年 第12期53卷 2461-2471页
作者: ZHANG PengTao 1,2 , WANG Wei 1,2 & TAN Ying 1,2 1 Department of Machine Intelligence, School of Electronics Engineering and Computer Science, Peking University, Beijing 100871, China 2 Key Laboratory of Machine Perception, Ministry of Education, Peking University, Beijing 100871, China 1. Department of Machine Intelligence School of Electronics Engineering and Computer Science Peking University Beijing 100871 China2. Key Laboratory of Machine Perception Ministry of Education Peking University Beijing 100871 China
A malware detection model based on a negative selection algorithm with penalty factor (NSAPF) is proposed in this paper. This model extracts a malware instruction library (MIL), containing instructions that tend to ap... 详细信息
来源: 评论
negative selection algorithm with Variable-Sized r-Contiguous Matching Rule
Negative Selection Algorithm with Variable-Sized r-Contiguou...
收藏 引用
The 2010 IEEE International Conference on Progress in Informatics and Computing
作者: Yuebing Chen,Chao Feng,Quan Zhang,Chaojing Tang School of Electronic Science and Technology National University of Defense Technology Changsha Hunan 410073,China
We proposes a negative selection algorithm with variable-sized r-contiguous matching *** value of r can be used to balance between more generalization or more specification.A fixed r reaches a rough *** expect a varia... 详细信息
来源: 评论
Towards Efficient and Effective negative selection algorithm: A Convex Hull Representation Scheme
Towards Efficient and Effective Negative Selection Algorithm...
收藏 引用
8th International Conference of Simulated Evolution and Learning
作者: Majd, Mahshid Shoeleh, Farzaneh Hamzeh, Ali Hashemi, Sattar Shiraz Univ Dept Comp Sci & Engn Shiraz Iran
negative selection algorithm (NSA) is one of several algorithms inspired by the principles of natural immune system. The algorithm received the researchers attention due to its applicability in various research areas ... 详细信息
来源: 评论
A hybrid particle swarm optimization and artificial immune system algorithm for image enhancement
收藏 引用
SOFT COMPUTING 2015年 第8期19卷 2101-2109页
作者: Mahapatra, Prasant Kumar Ganguli, Susmita Kumar, Amod CSIR Cent Sci Instruments Org V Biomed Instrumentat Div 2 Chandigarh 160030 India Tezpur Univ Dept Elect & Commun Tezpur 784028 India
Image enhancement means to improve the perception of information in images. Histogram equalization (HE) and linear contrast stretching (LCS) are the commonly used methods for image enhancement. But images obtained thr... 详细信息
来源: 评论
Using IRP with a Novel Artificial Immune algorithm for Windows Malicious Executables Detection
Using IRP with a Novel Artificial Immune Algorithm for Windo...
收藏 引用
2016 IEEE International Conference on Progress in Informatics and Computing
作者: Fuyong Zhang Ying Ma School of Computer Science and Network Security Dongguan University of Technology School of Computer and Information Engineering Xiamen University of Technology
Run-time malware detection strategies have already attracted extensive attention due to its effectiveness and robustness. With regards to Windows operating system, the API(Application Program Interface) is chosen to... 详细信息
来源: 评论
A hybrid approach for efficient anomaly detection using metaheuristic methods
收藏 引用
JOURNAL OF ADVANCED RESEARCH 2015年 第4期6卷 609-619页
作者: Ghanem, Tamer F. Elkilani, Wail S. Abdul-kader, Hatem M. Menofiya Univ Fac Comp & Informat Dept Informat Technol Shibin Al Kawm Menofiya Egypt Ain Shams Univ Fac Comp & Informat Dept Comp Syst Cairo Egypt Menofiya Univ Fac Comp & Informat Dept Informat Syst Shibin Al Kawm Menofiya Egypt
Network intrusion detection based on anomaly detection techniques has a significant role in protecting networks and systems against harmful activities. Different metaheuristic techniques have been used for anomaly det... 详细信息
来源: 评论
Application of an Information Fusion Method to Compound Fault Diagnosis of Rotating Machinery  27
Application of an Information Fusion Method to Compound Faul...
收藏 引用
27th Chinese Control and Decision Conference (CCDC)
作者: Hu, Qin Qin, Aisong Zhang, Qinghua Sun, Guoxi Shao, Longqiu Guangdong Univ Petrochem Technol Guangdong Prov Key Lab Petrochem Equipment Fault Maoming 525000 Peoples R China
Aiming at how to use the multiple fault features information synthetically to improve accuracy of compound fault diagnosis, an information fusion method based on the weighted evidence theory was proposed to effectivel... 详细信息
来源: 评论
Application of an Information Fusion Method to Compound Fault Diagnosis of Rotating Machinery
Application of an Information Fusion Method to Compound Faul...
收藏 引用
第27届中国控制与决策会议
作者: Qin Hu Aisong Qin Qinghua Zhang Guoxi Sun Longqiu Shao Guangdong provincial Key Laboratory of Petrochemical Equipment Fault Diagnosis Guangdong University of Petrochemical Technology
Aiming at how to use the multiple fault features information synthetically to improve accuracy of compound fault diagnosis,an information fusion method based on the weighted evidence theory was proposed to effectively... 详细信息
来源: 评论
A self-adaptive negative selection algorithm used for anomaly detection
收藏 引用
Progress in Natural Science:Materials International 2009年 第2期19卷 261-266页
作者: Jinquan Zeng,Xiaojie Liu,Tao Li,Caiming Liu,Lingxi Peng,Feixian Sun Department of Computer Science,Sichuan University,Chengdu 610065,China [a]Department of Computer Science Sichuan University Chengdu 610065 China
A novel negative selection algorithm (NSA),which is referred to as ANSA,is presented. In many actual anomaly detection systems,the training data are just partially composed of the normal elements,and the self/nonself ... 详细信息
来源: 评论
Re-editing and Censoring of Detectors in negative selection algorithm
收藏 引用
INTERNATIONAL JOURNAL OF COMPUTATIONAL INTELLIGENCE SYSTEMS 2009年 第3期2卷 298-311页
作者: Gao, X. Z. Ovaska, S. J. Wang, X. Aalto Univ Dept Elect Engn FI-02150 Espoo Finland
The negative selection algorithm (NSA) is a kind of novelty detection method inspired by the biological self/nonself discrimination principles. In this paper, we propose two new schemes for the detectors re-editing an... 详细信息
来源: 评论