咨询与建议

限定检索结果

文献类型

  • 43 篇 会议
  • 18 篇 期刊文献

馆藏范围

  • 61 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 58 篇 工学
    • 49 篇 计算机科学与技术...
    • 15 篇 电气工程
    • 10 篇 控制科学与工程
    • 6 篇 信息与通信工程
    • 6 篇 软件工程
    • 3 篇 电子科学与技术(可...
    • 2 篇 机械工程
    • 2 篇 仪器科学与技术
    • 1 篇 力学(可授工学、理...
    • 1 篇 材料科学与工程(可...
    • 1 篇 生物医学工程(可授...
    • 1 篇 网络空间安全
  • 10 篇 管理学
    • 9 篇 管理科学与工程(可...
    • 1 篇 公共管理
  • 6 篇 理学
    • 3 篇 数学
    • 3 篇 生物学
    • 1 篇 系统科学
  • 2 篇 医学
    • 1 篇 基础医学(可授医学...
    • 1 篇 临床医学
  • 1 篇 法学
    • 1 篇 法学
  • 1 篇 农学

主题

  • 61 篇 dendritic cell a...
  • 18 篇 danger theory
  • 16 篇 artificial immun...
  • 11 篇 artificial immun...
  • 7 篇 intrusion detect...
  • 7 篇 anomaly detectio...
  • 5 篇 classification
  • 5 篇 genetic algorith...
  • 4 篇 artificial immun...
  • 3 篇 malware
  • 3 篇 ids
  • 3 篇 immune system
  • 2 篇 cyber security
  • 2 篇 fault diagnosis
  • 2 篇 immersive virtua...
  • 2 篇 behavioural dete...
  • 2 篇 signal categoris...
  • 2 篇 state awareness
  • 2 篇 netflow protocol
  • 2 篇 cyber-physical s...

机构

  • 4 篇 northumbria univ...
  • 3 篇 northumbria univ...
  • 3 篇 univ nottingham ...
  • 2 篇 sathyabama univ ...
  • 2 篇 minist def def s...
  • 2 篇 xiamen univ sch ...
  • 2 篇 school of comput...
  • 2 篇 wuhan univ comp ...
  • 2 篇 cuny city coll d...
  • 2 篇 inst super gest ...
  • 1 篇 univ portsmouth ...
  • 1 篇 college of compu...
  • 1 篇 nagarjuna coll e...
  • 1 篇 univ nottingham ...
  • 1 篇 univ manouba nat...
  • 1 篇 hsiuping inst te...
  • 1 篇 pukyong natl uni...
  • 1 篇 south cent univ ...
  • 1 篇 guangdong prov k...
  • 1 篇 univ northumbria...

作者

  • 8 篇 yang longzhi
  • 7 篇 elisa noe
  • 5 篇 greensmith julie
  • 4 篇 chao fei
  • 3 篇 chelly zeineb
  • 3 篇 naik nitin
  • 3 篇 ou chung-ming
  • 3 篇 elouedi zied
  • 2 篇 abu bakar azural...
  • 2 篇 mohsin mohamad f...
  • 2 篇 saadawi tarek
  • 2 篇 lokesh m. r.
  • 2 篇 igbe obinna
  • 2 篇 ajayi oluwaseyi
  • 2 篇 el-alfy el-sayed...
  • 2 篇 liang yiwen
  • 2 篇 kumaraswamy y. s...
  • 2 篇 aickelin uwe
  • 2 篇 hamdan abdul raz...
  • 2 篇 liu sai

语言

  • 60 篇 英文
  • 1 篇 中文
检索条件"主题词=dendritic cell algorithm"
61 条 记 录,以下是11-20 订阅
排序:
dendritic cell algorithm Enhancement Using Fuzzy Inference System for Network Intrusion Detection
Dendritic Cell Algorithm Enhancement Using Fuzzy Inference S...
收藏 引用
IEEE International Conference on Fuzzy Systems (FUZZ-IEEE)
作者: Elisa, Noe Yang, Longzhi Fu, Xin Naik, Nitin Northumbria Univ Dept Comp & Informat Sci Newcastle Upon Tyne Tyne & Wear England Xiamen Univ Sch Management Xiamen Peoples R China Minist Def Def Sch Commun & Informat Syst London England
dendritic cell algorithm (DCA) is an immune-inspired classification algorithm which is developed for the purpose of anomaly detection in computer networks. The DCA uses a weighted function in its context detection pha... 详细信息
来源: 评论
dendritic cell algorithm with Fuzzy Inference System for Input Signal Generation  18th
Dendritic Cell Algorithm with Fuzzy Inference System for Inp...
收藏 引用
18th UK Workshop on Computational Intelligence (UKCI)
作者: Elisa, Noe Li, Jie Zuo, Zheming Yang, Longzhi Northumbria Univ Newcastle Upon Tyne NE1 8ST Tyne & Wear England
dendritic cell algorithm (DCA) is a binary classification system developed by abstracting the biological danger theory and the functioning of human dendritic cells. The DCA takes three signals as inputs, including dan... 详细信息
来源: 评论
Migration Threshold Tuning in the Deterministic dendritic cell algorithm  8th
Migration Threshold Tuning in the Deterministic Dendritic Ce...
收藏 引用
8th International Conference on the Theory and Practice of Natural Computing (TPNC)
作者: Greensmith, Julie Univ Nottingham Sch Comp Sci Nottingham NG8 1BB England
In this paper we explore the sensitivity of the migration threshold parameter in the Deterministic dendritic cell algorithm (dDCA), one of the four main types of Artificial Immune System. This is with a view to the fu... 详细信息
来源: 评论
A New Cryptojacking Malware Classifier Model Based on dendritic cell algorithm  3
A New Cryptojacking Malware Classifier Model Based on Dendri...
收藏 引用
3rd International Conference on Vision, Image and Signal Processing (ICVISP)
作者: Ahmad, Azuan Zainudin, Wan Shafiuddin Kama, Mohd Nazri Bin Ismail, Saiful Adli Saudi, Madihah Mohd Univ Sains Islam Malaysia Islamic Sci Inst Negeri Sembilan Malaysia CyberSecur Malaysia Seri Kembangan Selangor Malaysia Univ Teknol Malaysia Fak Teknol & Informat Razak Johor Baharu Johor Malaysia Univ Sains Islam Malaysia Islamic Sci Inst Nilai Negeri Sembilan Malaysia
A new threat known as "cryptojacking" has entered the picture where cryptojacking malware is the future trend for cyber criminals, who infect victim's device, install cryptojacking malware, and use the s... 详细信息
来源: 评论
A dendritic cell algorithm Based Approach for Malicious TCP Port Scanning Detection  15
A Dendritic Cell Algorithm Based Approach for Malicious TCP ...
收藏 引用
15th IEEE International Wireless Communications and Mobile Computing Conference (IEEE IWCMC)
作者: Almasalmeh, Nuha Saidi, Firas Trabelsi, Zouheir United Arab Emirates Univ Coll Informat Technol Al Ain U Arab Emirates Univ Manouba Natl Sch Comp Sci Manouba Tunisia
The proliferation of cyber-attacks brings up an urgent need to develop sophisticated detection tools. Some of these tools are based on algorithms inspired from the Human Immune System (HIS). The dendritic cell Algorit... 详细信息
来源: 评论
dendritic cell algorithm with Optimised Parameters using Genetic algorithm
Dendritic Cell Algorithm with Optimised Parameters using Gen...
收藏 引用
IEEE Congress on Evolutionary Computation (IEEE CEC) as part of the IEEE World Congress on Computational Intelligence (IEEE WCCI)
作者: Elisa, Noe Yang, Longzhi Naik, Nitin Northumbria Univ Dept Comp & Informat Sci Newcastle Upon Tyne Tyne & Wear England Minist Def Def Sch Commun Informat Syst London England
Intrusion detection systems are developed with the abilities to discriminate between normal and anomalous traffic behaviours. The core challenge in implementing an intrusion detection systems is to determine and stop ... 详细信息
来源: 评论
A New Cryptojacking Malware Classifier Model Based on dendritic cell algorithm  2019
A New Cryptojacking Malware Classifier Model Based on Dendri...
收藏 引用
Proceedings of the 3rd International Conference on Vision, Image and Signal Processing
作者: Azuan Ahmad Wan Shafiuddin Mohd Nazri Kama Madihah Mohd Saudi Islamic Science Institute Universiti Sains Islam Malaysia Negeri Sembilan Malaysia Zainudin CyberSecurity Malaysia Seri Kembangan Selangor Malaysia Saiful Adli Bin Ismail Fakulti Teknologi dan Informatik Razak Universiti Teknologi Malaysia
A new threat known as "cryptojacking" has entered the picture where cryptojacking malware is the future trend for cyber criminals, who infect victim's device, install cryptojacking malware, and use the s... 详细信息
来源: 评论
A scalable and distributed dendritic cell algorithm for big data classification
收藏 引用
SWARM AND EVOLUTIONARY COMPUTATION 2019年 50卷 100432-000页
作者: Dagdia, Zaineb Chelly Aberystwyth Univ Dept Comp Sci Aberystwyth Dyfed Wales Inst Super Gest Tunis LARODEC Tunis Tunisia
In the era of big data, scaling evolution up to large-scale data sets is a very interesting and challenging task. The application of standard biological systems in such data sets is not straightforward. Therefore, a n... 详细信息
来源: 评论
dendritic cell algorithm Applied to Ping Scan Investigation Revisited: Detection Quality and Performance Analysis
收藏 引用
IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTATIONAL INTELLIGENCE 2017年 第4期1卷 236-247页
作者: Silva, Guilherme Costa Caminhas, Walmir Matos de Errico, Luciano Fed Univ Minas Gerais PPGEE UFMG Grad Program Elect Engn BR-31270901 Belo Horizonte MG Brazil Fed Univ Minas Gerais DELT UFMG Dept Elect Engn BR-31270901 Belo Horizonte MG Brazil
The dendritic cell algorithm is an immune inspired method based on the danger model, which relies on cell interactions to antigens and signals, considering the correlation between both events, to solve anomaly detecti... 详细信息
来源: 评论
A Revised dendritic cell algorithm Using K-Means Clustering  20
A Revised Dendritic Cell Algorithm Using K-Means Clustering
收藏 引用
20th IEEE International Conference on High Performance Computing and Communications (HPCC) / 16th IEEE International Conference on Smart City (SmartCity) / 4th IEEE International Conference on Data Science and Systems (DSS)
作者: Elisa, Noe Yang, Longzhi Qu, Yanpeng Chao, Fei Northumbria Univ Dept Comp & Informat Sci Newcastle Upon Tyne Tyne & Wear England Dalian Maritime Univ Informat Sci & Technol Coll Dalian Peoples R China Xiamen Univ Dept Cognit Sci Xiamen Peoples R China
The most daunting and challenging task in intrusion detection is to distinguishing between normal and malicious traffics effectively. In order to complete such a task, the biological danger theory has appeared to be o... 详细信息
来源: 评论