咨询与建议

限定检索结果

文献类型

  • 87 篇 期刊文献
  • 84 篇 会议
  • 3 篇 学位论文

馆藏范围

  • 174 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 162 篇 工学
    • 112 篇 计算机科学与技术...
    • 41 篇 电气工程
    • 27 篇 控制科学与工程
    • 16 篇 软件工程
    • 15 篇 信息与通信工程
    • 12 篇 机械工程
    • 10 篇 材料科学与工程(可...
    • 8 篇 仪器科学与技术
    • 6 篇 土木工程
    • 5 篇 建筑学
    • 5 篇 网络空间安全
    • 3 篇 电子科学与技术(可...
    • 3 篇 石油与天然气工程
    • 3 篇 航空宇航科学与技...
    • 2 篇 力学(可授工学、理...
    • 2 篇 生物医学工程(可授...
    • 1 篇 地质资源与地质工...
    • 1 篇 生物工程
    • 1 篇 安全科学与工程
  • 17 篇 理学
    • 6 篇 生物学
    • 5 篇 数学
    • 5 篇 化学
    • 4 篇 物理学
    • 1 篇 系统科学
    • 1 篇 统计学(可授理学、...
  • 17 篇 管理学
    • 17 篇 管理科学与工程(可...
  • 4 篇 医学
    • 2 篇 临床医学
  • 3 篇 经济学
    • 2 篇 应用经济学
  • 2 篇 艺术学
    • 2 篇 设计学(可授艺术学...
  • 1 篇 教育学
    • 1 篇 教育学

主题

  • 174 篇 negative selecti...
  • 69 篇 artificial immun...
  • 29 篇 anomaly detectio...
  • 23 篇 artificial immun...
  • 13 篇 intrusion detect...
  • 11 篇 fault diagnosis
  • 11 篇 fault detection
  • 9 篇 structural healt...
  • 8 篇 detector generat...
  • 7 篇 detector
  • 7 篇 v-detector
  • 6 篇 intrusion detect...
  • 6 篇 hypothesis testi...
  • 5 篇 computer securit...
  • 5 篇 detector generat...
  • 5 篇 clonal selection...
  • 4 篇 optimization
  • 4 篇 differential evo...
  • 4 篇 boundary self
  • 4 篇 i/o request pack...

机构

  • 5 篇 sichuan univ col...
  • 5 篇 sichuan univ col...
  • 5 篇 sichuan univ sch...
  • 5 篇 changzhou univ s...
  • 4 篇 shanghai univ sc...
  • 4 篇 sichuan univ sch...
  • 3 篇 univ elect sci &...
  • 2 篇 univ sci & techn...
  • 2 篇 sichuan univ col...
  • 2 篇 bahmanyar univ k...
  • 2 篇 xiamen univ tech...
  • 2 篇 univ teknol mala...
  • 2 篇 aalto univ inst ...
  • 2 篇 univ teknol mala...
  • 2 篇 shahid bahonar u...
  • 2 篇 koszalin univ te...
  • 2 篇 school of comput...
  • 2 篇 shanghai univ sc...
  • 2 篇 school of comput...
  • 2 篇 dongguan univ te...

作者

  • 15 篇 li tao
  • 6 篇 liu shulin
  • 6 篇 li dong
  • 4 篇 masciotta maria ...
  • 4 篇 barontini albert...
  • 4 篇 amado-mendes pau...
  • 4 篇 he junjiang
  • 4 篇 chavarette fabio...
  • 4 篇 zeng jie
  • 4 篇 chen wen
  • 3 篇 wawryn krzysztof
  • 3 篇 yang chunying
  • 3 篇 ramos luis f.
  • 3 篇 zeng jinquan
  • 3 篇 xu aiqiang
  • 3 篇 wang yunpeng
  • 3 篇 li tingjun
  • 3 篇 li beibei
  • 3 篇 li haibo
  • 3 篇 idris ismaila

语言

  • 166 篇 英文
  • 5 篇 其他
  • 2 篇 土耳其文
  • 1 篇 中文
检索条件"主题词=Negative selection algorithm"
174 条 记 录,以下是111-120 订阅
排序:
Detection of anomalies in compiled computer program files inspired by immune mechanisms using a template method
收藏 引用
JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES 2021年 第1期17卷 47-59页
作者: Wawryn, Krzysztof Widulinski, Patryk Koszalin Univ Technol Dept Elect & Comp Sci Ul Sniadeckich 2 PL-75453 Koszalin Poland
An intrusion detection system inspired by the human immune system is described: a custom artificial immune system that monitors a local area containing critical files in the operating system. The proposed mechanism sc... 详细信息
来源: 评论
A Smart System of Malware Detection Based on Artificial Immune Network and Deep Belief Network
收藏 引用
INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY 2021年 第1期15卷 1-25页
作者: Dung Hoang Le Nguyen Thanh Vu Tuan Dinh Le Vietnam Natl Univ Univ Informat Technol Hanoi Vietnam Ho Chi Minh City Univ Food Ind Ho Chi Minh City Vietnam Long An Univ Econ & Ind Tan An City Long An Vietnam
This paper proposes a smart system of virus detection that can classify a file as benign or malware with high accuracy detection rate. The approach is based on the aspects of the artificial immune system, in which an ... 详细信息
来源: 评论
A hybrid approach for efficient anomaly detection using metaheuristic methods
收藏 引用
JOURNAL OF ADVANCED RESEARCH 2015年 第4期6卷 609-619页
作者: Ghanem, Tamer F. Elkilani, Wail S. Abdul-kader, Hatem M. Menofiya Univ Fac Comp & Informat Dept Informat Technol Shibin Al Kawm Menofiya Egypt Ain Shams Univ Fac Comp & Informat Dept Comp Syst Cairo Egypt Menofiya Univ Fac Comp & Informat Dept Informat Syst Shibin Al Kawm Menofiya Egypt
Network intrusion detection based on anomaly detection techniques has a significant role in protecting networks and systems against harmful activities. Different metaheuristic techniques have been used for anomaly det... 详细信息
来源: 评论
Dual-filtering (DF) schemes for learning systems to prevent adversarial attacks
收藏 引用
COMPLEX & INTELLIGENT SYSTEMS 2023年 第4期9卷 3717-3738页
作者: Dasgupta, Dipankar Gupta, Kishor Datta Univ Memphis Memphis TN 38152 USA
Defenses against adversarial attacks are essential to ensure the reliability of machine-learning models as their applications are expanding in different domains. Existing ML defense techniques have several limitations... 详细信息
来源: 评论
negative selection BASED FUZZY FAULT DIAGNOSIS MODEL
JOURNAL OF THE FACULTY OF ENGINEERING AND ARCHITECTURE OF GA...
收藏 引用
JOURNAL OF THE FACULTY OF ENGINEERING AND ARCHITECTURE OF GAZI UNIVERSITY 2009年 第4期24卷 745-753页
作者: Aydin, Ilhan Karakose, Mehmet Akin, Erhan Firat Univ Bilgisayar Muhendisligi Bolumu TR-23119 Elazig Turkey
Fault diagnosis is important to ensure the continuity in the systems that the studies in this area have increased. The effectiveness of fault diagnosis methods has been enhanced by using intelligent computing techniqu... 详细信息
来源: 评论
Fault Detection Using negative selection and Genetic algorithms
收藏 引用
Instrumentation 2019年 第3期6卷 39-51页
作者: Anam ABID Zia Ul HAQ Muhammad Tahir KHAN University of Engineering and Technology PeshawarPakistan
In this paper,negative selection and genetic algorithms are combined and an improved bi-objective optimization scheme is presented to achieve optimized negative selection algorithm *** main aim of the optimal detector... 详细信息
来源: 评论
AN IMPROVED V-DETECTOR algorithm OF IDENTIFYING BOUNDARY SELF
AN IMPROVED V-DETECTOR ALGORITHM OF IDENTIFYING BOUNDARY SEL...
收藏 引用
International Conference on Machine Learning and Cybernetics
作者: Li, Gui-Yang Li, Tao Zeng, Jie Li, Hai-Bo Sichuan Univ Sch Comp Sci Chengdu 610065 Peoples R China
The V-detector algorithm is a real-valued negative selection algorithm with variable-sized detectors. In this paper, several flaws existed in the algorithm are investigated and analyzed. An improved V-detector algorit... 详细信息
来源: 评论
Investigating One-Class Classifiers to Diagnose Alzheimer's Disease from Handwriting  21st
Investigating One-Class Classifiers to Diagnose Alzheimer's ...
收藏 引用
21st International Conference on Image Analysis and Processing (ICIAP)
作者: Parziale, Antonio Della Cioppa, Antonio Marcelli, Angelo Univ Salerno DIEM Via Giovanni Paolo II 132 I-84084 Fisciano SA Italy Univ Salerno Unit Natl Lab Artificial Intelligence & Intelligent Sy CINI Fisciano SA Italy ICAR CNR Via P Castellino 111 I-80131 Naples Italy
The analysis of handwriting and drawing has been adopted since the early studies to help diagnose neurodegenerative diseases, such as Alzheimer's and Parkinson's. Departing from the current state-of-the-art me... 详细信息
来源: 评论
Accuracy Evaluation of a Credit Card Fraud Detection System on Hadoop MapReduce
Accuracy Evaluation of a Credit Card Fraud Detection System ...
收藏 引用
5th Conference on Information and Knowledge Technology (IKT)
作者: Hormozi, Elham Hormozi, Hadi Akbari, Mohammad Kazem Javan, Morteza Sargolzaei Mazandaran Univ Sci & Technol Comp Engn & Informat Technol Babol Sar Iran Arak Univ Comp Engn & Informat Technol Arak Iran Amirkabir Univ Technol Tehran Polytech Comp Engn & Informat Technol Tehran Iran
In digitalization era, credit card fraud detection is of high significance to financial organizations. This paper discussed about credit card fraud detection by parallelizing of negative selection algorithm on the Clo... 详细信息
来源: 评论
T-detectors maturation algorithm with min-match range model
T-detectors maturation algorithm with min-match range model
收藏 引用
3rd IEEE International Conference on Intelligent Systems
作者: Chen, Jungan Zhejiang Wanli Univ Zhejiang 315100 Peoples R China
negative selection algorithm is used to generate detector for change detection, anomaly detection. But it can not be adapted to the change of self data because the match threshold must be set at first. To solve the pr... 详细信息
来源: 评论