咨询与建议

限定检索结果

文献类型

  • 87 篇 期刊文献
  • 84 篇 会议
  • 3 篇 学位论文

馆藏范围

  • 174 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 162 篇 工学
    • 112 篇 计算机科学与技术...
    • 41 篇 电气工程
    • 27 篇 控制科学与工程
    • 16 篇 软件工程
    • 15 篇 信息与通信工程
    • 12 篇 机械工程
    • 10 篇 材料科学与工程(可...
    • 8 篇 仪器科学与技术
    • 6 篇 土木工程
    • 5 篇 建筑学
    • 5 篇 网络空间安全
    • 3 篇 电子科学与技术(可...
    • 3 篇 石油与天然气工程
    • 3 篇 航空宇航科学与技...
    • 2 篇 力学(可授工学、理...
    • 2 篇 生物医学工程(可授...
    • 1 篇 地质资源与地质工...
    • 1 篇 生物工程
    • 1 篇 安全科学与工程
  • 17 篇 理学
    • 6 篇 生物学
    • 5 篇 数学
    • 5 篇 化学
    • 4 篇 物理学
    • 1 篇 系统科学
    • 1 篇 统计学(可授理学、...
  • 17 篇 管理学
    • 17 篇 管理科学与工程(可...
  • 4 篇 医学
    • 2 篇 临床医学
  • 3 篇 经济学
    • 2 篇 应用经济学
  • 2 篇 艺术学
    • 2 篇 设计学(可授艺术学...
  • 1 篇 教育学
    • 1 篇 教育学

主题

  • 174 篇 negative selecti...
  • 69 篇 artificial immun...
  • 29 篇 anomaly detectio...
  • 23 篇 artificial immun...
  • 13 篇 intrusion detect...
  • 11 篇 fault diagnosis
  • 11 篇 fault detection
  • 9 篇 structural healt...
  • 8 篇 detector generat...
  • 7 篇 detector
  • 7 篇 v-detector
  • 6 篇 intrusion detect...
  • 6 篇 hypothesis testi...
  • 5 篇 computer securit...
  • 5 篇 detector generat...
  • 5 篇 clonal selection...
  • 4 篇 optimization
  • 4 篇 differential evo...
  • 4 篇 boundary self
  • 4 篇 i/o request pack...

机构

  • 5 篇 sichuan univ col...
  • 5 篇 sichuan univ col...
  • 5 篇 sichuan univ sch...
  • 5 篇 changzhou univ s...
  • 4 篇 shanghai univ sc...
  • 4 篇 sichuan univ sch...
  • 3 篇 univ elect sci &...
  • 2 篇 univ sci & techn...
  • 2 篇 sichuan univ col...
  • 2 篇 bahmanyar univ k...
  • 2 篇 xiamen univ tech...
  • 2 篇 univ teknol mala...
  • 2 篇 aalto univ inst ...
  • 2 篇 univ teknol mala...
  • 2 篇 shahid bahonar u...
  • 2 篇 koszalin univ te...
  • 2 篇 school of comput...
  • 2 篇 shanghai univ sc...
  • 2 篇 school of comput...
  • 2 篇 dongguan univ te...

作者

  • 15 篇 li tao
  • 6 篇 liu shulin
  • 6 篇 li dong
  • 4 篇 masciotta maria ...
  • 4 篇 barontini albert...
  • 4 篇 amado-mendes pau...
  • 4 篇 he junjiang
  • 4 篇 chavarette fabio...
  • 4 篇 zeng jie
  • 4 篇 chen wen
  • 3 篇 wawryn krzysztof
  • 3 篇 yang chunying
  • 3 篇 ramos luis f.
  • 3 篇 zeng jinquan
  • 3 篇 xu aiqiang
  • 3 篇 wang yunpeng
  • 3 篇 li tingjun
  • 3 篇 li beibei
  • 3 篇 li haibo
  • 3 篇 idris ismaila

语言

  • 166 篇 英文
  • 5 篇 其他
  • 2 篇 土耳其文
  • 1 篇 中文
检索条件"主题词=Negative Selection algorithm"
174 条 记 录,以下是31-40 订阅
排序:
An antigen space density based real-value negative selection algorithm
收藏 引用
APPLIED SOFT COMPUTING 2017年 61卷 860-874页
作者: Yang, Tao Chen, Wen Li, Tao Sichuan Univ Coll Comp Sci Chengdu 610065 Sichuan Peoples R China
The negative selection algorithm (NSA) is an important detector generation algorithm for artificial immune systems. In high-dimensional space, antigens (data samples) distribute sparsely and unevenly, and most of them... 详细信息
来源: 评论
An Improved negative selection algorithm Based on Subspace Density Seeking
收藏 引用
IEEE ACCESS 2017年 5卷 12189-12198页
作者: Liu, Zhengjun Li, Tao Yang, Jin Yang, Tao Sichuan Univ Coll Comp Sci Chengdu 610065 Sichuan Peoples R China Sichuan Univ Coll Cybersecur Chengdu 610065 Sichuan Peoples R China
negative selection algorithm (NSA) is an important method for generating detectors in artificial immune systems. Traditional NSAs randomly generate detectors in the whole feature space. However, with increasing dimens... 详细信息
来源: 评论
Detecting Denial of Service Attacks using a Combination of Dendritic Cell algorithm and the negative selection algorithm  2
Detecting Denial of Service Attacks using a Combination of D...
收藏 引用
2nd IEEE International Conference on Smart Cloud (SmartCloud)
作者: Igbe, Obinna Ajayi, Oluwaseyi Saadawi, Tarek CUNY City Coll Dept Elect Engn New York NY 10031 USA
As one of the most common and aggressive means, denial-of-service (DoS) attacks cause serious impact on computing systems and networks. This paper presents a system for detecting denial of service (DoS) attacks in a n... 详细信息
来源: 评论
Enhanced negative selection algorithm for Malicious Node Detection in MANET  9
Enhanced Negative Selection Algorithm for Malicious Node Det...
收藏 引用
9th International Conference on Advanced Computing (ICoAC)
作者: Raja, Kathiroli Natarajan, Indra Anna Univ Dept Comp Technol Madras 600044 Tamil Nadu India
Intrusion detection in MANETS is inevitable as these networks are dynamic, open and no central authority to monitor the nodes' activities. Since the network is open, it allows the node to enter and exit at any poi... 详细信息
来源: 评论
Ransomware Detection Based on V-detector negative selection algorithm
Ransomware Detection Based on V-detector Negative Selection ...
收藏 引用
International Conference on Security, Pattern Analysis, and Cybernetics (ICSPAC)
作者: Lu, Tianliang Zhang, Lu Wang, Shunye Gong, Qi Peoples Publ Secur Univ China Inst Informat Technol & Network Secur Beijing Peoples R China
As a new type of malicious software, ransomw are is one of the biggest security threats in recent years. Inspired by biological immune system, a ransomware detection method based on V-detector negative selection algor... 详细信息
来源: 评论
A boundary-fixed negative selection algorithm with online adaptive learning under small samples for anomaly detection
收藏 引用
ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE 2016年 50卷 93-105页
作者: Li, Dong Liu, Shulin Zhang, Hongli Shanghai Univ Sch Mechatron Engn & Automat Shanghai 200072 Peoples R China Changzhou Univ Sch Petr Engn Changzhou 213164 Peoples R China
The traditional negative selection algorithm (NSA) lacks online adaptive learning ability, and this restricts its application range. A new NSA, boundary-fixed negative selection algorithm with online adaptive learning... 详细信息
来源: 评论
Application of negative selection algorithm (NSA) for test data generation of path testing
收藏 引用
APPLIED SOFT COMPUTING 2016年 49卷 1118-1128页
作者: Mohi-Aldeen, Shayma Mustafa Mohamad, Radziah Deris, Safaai Univ Teknol Malaysia Fac Comp Utm Skudai 81310 Johor Malaysia Univ Malaysia Kelantan Fac Teknol Kreatif Dan Warisan Kelantan 16100 Malaysia Univ Mosul Coll Comp Sci & Math Mosul 41002 Iraq
Path testing is one of the areas covered in structural testing. In this process, it is a key challenge to search for a set of test data in the whole search space to satisfy path coverage. Thus, finding an efficient me... 详细信息
来源: 评论
Integrated negative selection algorithm and Positive selection algorithm for Malware Detection  4
Integrated Negative Selection Algorithm and Positive Selecti...
收藏 引用
4th IEEE International Conference on Progress in Informatics and Computing (IEEE PIC)
作者: Zhang, Fuyong Ma, Ying Dongguan Univ Technol Sch Comp Sci & Network Secur Dongguan Peoples R China Xiamen Univ Technol Sch Comp & Informat Engn Xiamen Peoples R China
Run-time malware detection strategies are efficient and robust, which get more and more attention. In this paper, we use I/O Request Package (IRP) sequences for malware detection. N-gram will be used to analyze IRP se... 详细信息
来源: 评论
negative selection algorithm with constant detectors for anomaly detection
收藏 引用
APPLIED SOFT COMPUTING 2015年 36卷 618-632页
作者: Li, Dong Liu, Shulin Zhang, Hongli Shanghai Univ Sch Mech Engn & Automat Shanghai 200072 Peoples R China Changzhou Univ Sch Petr Engn Changzhou 213164 Peoples R China
In the paper, two novel negative selection algorithms (NSAs) were proposed: FB-NSA and FFB-NSA. FB-NSA has two types of detectors: constant-sized detector (CFB-NSA) and variable-sized detector (VFB-NSA). The detectors... 详细信息
来源: 评论
negative selection algorithm Based Unknown Malware Detection Model  10th
Negative Selection Algorithm Based Unknown Malware Detection...
收藏 引用
10th International Conference on Bio-Inspired Computing - Theories and Applications (BIC-TA)
作者: Zeng, Jinquan Tang, Weiwen Univ Elect Sci & Technol China Sch Comp Sci & Engn Chengdu 610054 Peoples R China Sichuan Commun Res Planning & Designing Co Ltd Chengdu 610041 Peoples R China
Nowadays, malwares have become one of the most serious security threats for computer systems and how to detect malwares is a difficult task, especially, unknown malwares. Artificial immune systems (AIS) is spired by b... 详细信息
来源: 评论