咨询与建议

限定检索结果

文献类型

  • 87 篇 期刊文献
  • 84 篇 会议
  • 3 篇 学位论文

馆藏范围

  • 174 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 162 篇 工学
    • 112 篇 计算机科学与技术...
    • 41 篇 电气工程
    • 27 篇 控制科学与工程
    • 16 篇 软件工程
    • 15 篇 信息与通信工程
    • 12 篇 机械工程
    • 10 篇 材料科学与工程(可...
    • 8 篇 仪器科学与技术
    • 6 篇 土木工程
    • 5 篇 建筑学
    • 5 篇 网络空间安全
    • 3 篇 电子科学与技术(可...
    • 3 篇 石油与天然气工程
    • 3 篇 航空宇航科学与技...
    • 2 篇 力学(可授工学、理...
    • 2 篇 生物医学工程(可授...
    • 1 篇 地质资源与地质工...
    • 1 篇 生物工程
    • 1 篇 安全科学与工程
  • 17 篇 理学
    • 6 篇 生物学
    • 5 篇 数学
    • 5 篇 化学
    • 4 篇 物理学
    • 1 篇 系统科学
    • 1 篇 统计学(可授理学、...
  • 17 篇 管理学
    • 17 篇 管理科学与工程(可...
  • 4 篇 医学
    • 2 篇 临床医学
  • 3 篇 经济学
    • 2 篇 应用经济学
  • 2 篇 艺术学
    • 2 篇 设计学(可授艺术学...
  • 1 篇 教育学
    • 1 篇 教育学

主题

  • 174 篇 negative selecti...
  • 69 篇 artificial immun...
  • 29 篇 anomaly detectio...
  • 23 篇 artificial immun...
  • 13 篇 intrusion detect...
  • 11 篇 fault diagnosis
  • 11 篇 fault detection
  • 9 篇 structural healt...
  • 8 篇 detector generat...
  • 7 篇 detector
  • 7 篇 v-detector
  • 6 篇 intrusion detect...
  • 6 篇 hypothesis testi...
  • 5 篇 computer securit...
  • 5 篇 detector generat...
  • 5 篇 clonal selection...
  • 4 篇 optimization
  • 4 篇 differential evo...
  • 4 篇 boundary self
  • 4 篇 i/o request pack...

机构

  • 5 篇 sichuan univ col...
  • 5 篇 sichuan univ col...
  • 5 篇 sichuan univ sch...
  • 5 篇 changzhou univ s...
  • 4 篇 shanghai univ sc...
  • 4 篇 sichuan univ sch...
  • 3 篇 univ elect sci &...
  • 2 篇 univ sci & techn...
  • 2 篇 sichuan univ col...
  • 2 篇 bahmanyar univ k...
  • 2 篇 xiamen univ tech...
  • 2 篇 univ teknol mala...
  • 2 篇 aalto univ inst ...
  • 2 篇 univ teknol mala...
  • 2 篇 shahid bahonar u...
  • 2 篇 koszalin univ te...
  • 2 篇 school of comput...
  • 2 篇 shanghai univ sc...
  • 2 篇 school of comput...
  • 2 篇 dongguan univ te...

作者

  • 15 篇 li tao
  • 6 篇 liu shulin
  • 6 篇 li dong
  • 4 篇 masciotta maria ...
  • 4 篇 barontini albert...
  • 4 篇 amado-mendes pau...
  • 4 篇 he junjiang
  • 4 篇 chavarette fabio...
  • 4 篇 zeng jie
  • 4 篇 chen wen
  • 3 篇 wawryn krzysztof
  • 3 篇 yang chunying
  • 3 篇 ramos luis f.
  • 3 篇 zeng jinquan
  • 3 篇 xu aiqiang
  • 3 篇 wang yunpeng
  • 3 篇 li tingjun
  • 3 篇 li beibei
  • 3 篇 li haibo
  • 3 篇 idris ismaila

语言

  • 166 篇 英文
  • 5 篇 其他
  • 2 篇 土耳其文
  • 1 篇 中文
检索条件"主题词=Negative Selection algorithm"
174 条 记 录,以下是91-100 订阅
排序:
A Novel Approach of Detector Generation for Real-Valued negative selection algorithm
A Novel Approach of Detector Generation for Real-Valued Nega...
收藏 引用
2nd International Conference on Frontiers of Manufacturing and Design Science (ICFMD 2011)
作者: Hui, Ronghua Lou, Peihuang Zhao, Peng Nanjing Univ Aeronaut & Astronaut Coll Mech & Elect Engn Nanjing 210016 Jiangsu Peoples R China
The detector sets generated by Real-Valued negative selection algorithm (RNSA) are usually numerous, without optimization, and can not work under real-time condition. Thus, a novel approach of detector generation for ... 详细信息
来源: 评论
Fault Detection Using negative selection and Genetic algorithms
收藏 引用
Instrumentation 2019年 第3期6卷 39-51页
作者: Anam ABID Zia Ul HAQ Muhammad Tahir KHAN University of Engineering and Technology PeshawarPakistan
In this paper,negative selection and genetic algorithms are combined and an improved bi-objective optimization scheme is presented to achieve optimized negative selection algorithm *** main aim of the optimal detector... 详细信息
来源: 评论
A real-time anomaly-based IDS for cyber-attack detection at the industrial process level of Critical Infrastructures
收藏 引用
INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION 2018年 23卷 11-20页
作者: Clotet, Xavier Moyano, Jose Leon, Gladys Aplicac Informat Avanzada SL Sant Cugat Del Valles Spain
This work presents a real time anomaly-based detection system designed to work at the industrial process level of Critical Infrastructures (CI). The system's core algorithm is based on negative selection and works... 详细信息
来源: 评论
Detecting RTL Trojans Using Artificial Immune Systems and High Level Behavior Classification
Detecting RTL Trojans Using Artificial Immune Systems and Hi...
收藏 引用
作者: Zareen, Farhath University of South Florida
学位级别:M.S.
Security assurance in a computer system can be viewed as distinguishing between self and non-self. Artificial Immune Systems (AIS) are a class of machine learning (ML) techniques inspired by the behavior of innate bio... 详细信息
来源: 评论
Based on negative selection algorithm to generate long-period pseudo-random sequence
收藏 引用
Research Journal of Applied Sciences, Engineering and Technology 2012年 第14期4卷 2167-2170页
作者: Yue, Mingyu Department of Electronic Information Sichuan University Chengdu 610065 China Chongqing City Management College Information Center Chongqing 400055 China
This study presents a method of generating long-period pseudo-random sequence based on a plaintext and negative selection algorithm for real applications. It is a new method that extracts the generated factor from the... 详细信息
来源: 评论
Artificial Immune-based algorithm for Academic Leadership Assessment
收藏 引用
INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS 2019年 第8期10卷 364-370页
作者: Jantan, Hamidah Azemi, Nur Hamizah Syafiqah Che Othman, Zulaiha Ali Univ Teknol MARA UiTM Terengganu Fac Comp & Math Sci Kuala Terengganu Terengganu Malaysia Univ Kebangsaan Malaysia Fac Informat Sci & Technol Ctr Artificial Intelligence Technol Bangi Malaysia
Artificial Immune-based algorithm is inspired by the biological immune system as computational intelligence approach in data analysis. negative selection algorithm is derived from immune-based algorithm's family t... 详细信息
来源: 评论
negative selection algorithm Using Natural Frequency for Novelty Detection under Temperature Variations
Negative Selection Algorithm Using Natural Frequency for Nov...
收藏 引用
International Conference on Structures and Building Materials
作者: Li, Miao Ren, Wei-Xin Cent S Univ Dept Civil Engn Changsha 410075 Hunan Peoples R China
The vibration features are affected by damage in structure and environmental conditions while the bridges are in the operation. Environment effects should not be ignored in making correct diagnoses of structures. Nega... 详细信息
来源: 评论
Detecting RTL Trojans using Artificial Immune Systems and High Level Behavior Classification
Detecting RTL Trojans using Artificial Immune Systems and Hi...
收藏 引用
3rd Asian Hardware Oriented Security and Trust Symposium (AsianHOST)
作者: Zareen, Farhath Karam, Robert Univ S Florida Dept CSE Tampa FL 33620 USA
Security assurance in a computer system can be viewed as distinguishing between self and non-self. Artificial Immune Systems (AIS) are a class of machine learning (ML) techniques inspired by the behavior of innate bio... 详细信息
来源: 评论
Insider Threat Detection using an Artificial Immune system algorithm  9
Insider Threat Detection using an Artificial Immune system A...
收藏 引用
9th Annual IEEE Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON)
作者: Igbe, Obinna Saadawi, Tarek CUNY City Coll Dept Elect Engn New York NY 10031 USA
Insider threats result from legitimate users abusing their privileges, causing tremendous damage or losses. Malicious insiders can be the main threats to an organization. This paper presents an anomaly detection syste... 详细信息
来源: 评论
Optimization and Application of Real-valued negative selection algorithm
Optimization and Application of Real-valued Negative Selecti...
收藏 引用
International Conference on Power Electronics and Engineering Application (PEEA)
作者: Xu Aiqiang Liu Yong Zhao Xiuli Yang Chunying Li Tingjun Naval Aeronaut & Astronaut Univ Yantai 264001 Peoples R China
Concerned with the problem of lacking fault samples of complex equipments, it studies the principle and application of negative selection algorithm of artificial immune system. The detectors generation mechanism of re... 详细信息
来源: 评论