咨询与建议

限定检索结果

文献类型

  • 43 篇 会议
  • 18 篇 期刊文献

馆藏范围

  • 61 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 58 篇 工学
    • 49 篇 计算机科学与技术...
    • 15 篇 电气工程
    • 10 篇 控制科学与工程
    • 6 篇 信息与通信工程
    • 6 篇 软件工程
    • 3 篇 电子科学与技术(可...
    • 2 篇 机械工程
    • 2 篇 仪器科学与技术
    • 1 篇 力学(可授工学、理...
    • 1 篇 材料科学与工程(可...
    • 1 篇 生物医学工程(可授...
    • 1 篇 网络空间安全
  • 10 篇 管理学
    • 9 篇 管理科学与工程(可...
    • 1 篇 公共管理
  • 6 篇 理学
    • 3 篇 数学
    • 3 篇 生物学
    • 1 篇 系统科学
  • 2 篇 医学
    • 1 篇 基础医学(可授医学...
    • 1 篇 临床医学
  • 1 篇 法学
    • 1 篇 法学
  • 1 篇 农学

主题

  • 61 篇 dendritic cell a...
  • 18 篇 danger theory
  • 16 篇 artificial immun...
  • 11 篇 artificial immun...
  • 7 篇 intrusion detect...
  • 7 篇 anomaly detectio...
  • 5 篇 classification
  • 5 篇 genetic algorith...
  • 4 篇 artificial immun...
  • 3 篇 malware
  • 3 篇 ids
  • 3 篇 immune system
  • 2 篇 cyber security
  • 2 篇 fault diagnosis
  • 2 篇 immersive virtua...
  • 2 篇 behavioural dete...
  • 2 篇 signal categoris...
  • 2 篇 state awareness
  • 2 篇 netflow protocol
  • 2 篇 cyber-physical s...

机构

  • 4 篇 northumbria univ...
  • 3 篇 northumbria univ...
  • 3 篇 univ nottingham ...
  • 2 篇 sathyabama univ ...
  • 2 篇 minist def def s...
  • 2 篇 xiamen univ sch ...
  • 2 篇 school of comput...
  • 2 篇 wuhan univ comp ...
  • 2 篇 cuny city coll d...
  • 2 篇 inst super gest ...
  • 1 篇 univ portsmouth ...
  • 1 篇 college of compu...
  • 1 篇 nagarjuna coll e...
  • 1 篇 univ nottingham ...
  • 1 篇 univ manouba nat...
  • 1 篇 hsiuping inst te...
  • 1 篇 pukyong natl uni...
  • 1 篇 south cent univ ...
  • 1 篇 guangdong prov k...
  • 1 篇 univ northumbria...

作者

  • 8 篇 yang longzhi
  • 7 篇 elisa noe
  • 5 篇 greensmith julie
  • 4 篇 chao fei
  • 3 篇 chelly zeineb
  • 3 篇 naik nitin
  • 3 篇 ou chung-ming
  • 3 篇 elouedi zied
  • 2 篇 abu bakar azural...
  • 2 篇 mohsin mohamad f...
  • 2 篇 saadawi tarek
  • 2 篇 lokesh m. r.
  • 2 篇 igbe obinna
  • 2 篇 ajayi oluwaseyi
  • 2 篇 el-alfy el-sayed...
  • 2 篇 liang yiwen
  • 2 篇 kumaraswamy y. s...
  • 2 篇 aickelin uwe
  • 2 篇 hamdan abdul raz...
  • 2 篇 liu sai

语言

  • 60 篇 英文
  • 1 篇 中文
检索条件"主题词=dendritic cell algorithm"
61 条 记 录,以下是31-40 订阅
排序:
Method of Locating Anomaly Source in Software System Based on dendritic cell algorithm
Method of Locating Anomaly Source in Software System Based o...
收藏 引用
International Conference on Mechatronics Engineering and Computing Technology (ICMECT)
作者: Liu Sai Ke Jie Wuhan Univ Comp Sch Wuhan 430072 Peoples R China
The method of anomaly detection in traditional software system cannot locate anomaly or find the lack of abnormal source accurately and timely. With regard to this deficiency, this paper presents an improved algorithm... 详细信息
来源: 评论
A Novel Bio-Inspired Predictive Model for Spam Filtering Based on dendritic cell algorithm
A Novel Bio-Inspired Predictive Model for Spam Filtering Bas...
收藏 引用
IEEE Symposium on Computational Intelligence in Cyber Security
作者: El-Alfy, El-Sayed M. Al-Hasan, Ali A. King Fahd Univ Petr & Minerals Coll Comp Sci & Engn Dhahran 31261 Saudi Arabia Saudi Aramco Dhahran 31261 Saudi Arabia
Electronic mail has become the most popular, frequently-used and powerful medium for quicker personal and business communications. However, one of the common security issues and annoying problems faced by email users ... 详细信息
来源: 评论
ANDROID MALWARE DETECTION USING THE dendritic cell algorithm  13
ANDROID MALWARE DETECTION USING THE DENDRITIC CELL ALGORITHM
收藏 引用
International Conference on Machine Learning and Cybernetics
作者: Ng, Deniel V. Hwang, Jen-Ing G. Fu Jen Catholic Univ Dept Comp Sci & Informat Engn New Taipei Taiwan
Most smartphones run on Android OS, which facilitates the installation of third-party applications. Unfortunately, malware also exists for the Android. Malware can perform various harmful activities. In this paper, we... 详细信息
来源: 评论
A Rough Information Extraction Technique for the dendritic cell algorithm within Imprecise Circumstances
A Rough Information Extraction Technique for the Dendritic C...
收藏 引用
8th Hellenic Conference on Artificial Intelligence (SETN)
作者: Chelly, Zeineb Elouedi, Zied Univ Tunis LARODEC High Inst Management Tunis Tunis Tunisia
The dendritic cell algorithm (DCA) is an immune inspired classification algorithm based on the behavior of dendritic cells (DCs). The performance of DCA depends on the extracted features and their categorization to th... 详细信息
来源: 评论
Multiagent-based computer virus detection systems: abstraction from dendritic cell algorithm with danger theory
收藏 引用
TELECOMMUNICATION SYSTEMS 2013年 第2期52卷 681-691页
作者: Ou, Chung-Ming Kainan Univ Dept Informat Management Tao Yuan 338 Taiwan
Biologically-inspired artificial immune systems (AIS) have been applied to computer virus detection systems (CVDS). A multiagent-based CVDS (ABCVDS) inspired by the danger theory of human immune system is proposed. Th... 详细信息
来源: 评论
Theoretical formulation and analysis of the deterministic dendritic cell algorithm
收藏 引用
BIOSYSTEMS 2013年 第2期111卷 127-135页
作者: Gu, Feng Greensmith, Julie Aickelin, Uwe Univ Leeds Sch Comp Leeds LS2 9JT W Yorkshire England Univ Nottingham Sch Comp Sci Nottingham NG8 1BB England
As one of the emerging algorithms in the field of artificial immune systems (AIS), the dendritic cell algorithm (DCA) has been successfully applied to a number of challenging real-world problems. However, one criticis... 详细信息
来源: 评论
Innate immune memory and its application to artificial immune systems
收藏 引用
JOURNAL OF SUPERCOMPUTING 2022年 第9期78卷 11680-11701页
作者: Wang, Dongmei Liang, Yiwen Dong, Hongbin Tan, Chengyu Xiao, Zhenhua Liu, Sai Wuhan Univ Sch Comp Sci Wuhan 430072 Peoples R China Wuhan Univ Sch Cyber Sci & Engn Wuhan 430072 Peoples R China South Cent Univ Nationalities Coll Comp Sci Wuhan 430072 Peoples R China
The study of innate immune-based algorithms is an important research domain in Artificial Immune System (AIS), such as dendritic cell algorithm (DCA), Toll-Like Receptor algorithm (TLRA). The parameters in these algor... 详细信息
来源: 评论
Accelerating Cyber-Breach Investigations Through Novel Use of Artificial Immune System algorithms  42nd
Accelerating Cyber-Breach Investigations Through Novel Use o...
收藏 引用
42nd SGAI International Conference on Innovative Techniques and Applications of Artificial Intelligence
作者: Donnachie, Benjamin Verrall, Jason Hopgood, Adrian Wong, Patrick Kennedy, Ian Open Univ Walton Hall Milton Keynes England Univ Portsmouth Winston Churchill Ave Portsmouth England
The use of artificial immune systems for investigation of cyber-security breaches is presented. Manual reviews of disk images are impractical because of the size of the dataset. Machine-learning algorithms for detecti... 详细信息
来源: 评论
The dendritic cell algorithm Optimized by Chemokine Simulator in Spyware Detection
The Dendritic Cell Algorithm Optimized by Chemokine Simulato...
收藏 引用
International Conference on Computer Science and Network Technology (ICCSNT)
作者: Yuan, Jie Tan, Chengyu Chen, Yuxi Xiao, Yue Gu, Yichun Wuhan Univ Comp Sch Wuhan 430072 Peoples R China Wuhan Univ Int Sch Software Wuhan Peoples R China
Spywares' changeable and complex hidden acts and behavior correlation increase the difficulty in detecting. Most of current detection methods put emphasis on the hidden characteristics whereas ignore the other. De... 详细信息
来源: 评论
A dendritic cell algorithm for Real-Time Anomaly Detection
A Dendritic Cell Algorithm for Real-Time Anomaly Detection
收藏 引用
2012 IEEE International Conference on Computer Science and Automation Engineering(CSAE 2012)
作者: Song Yuan 1,2 ,Qi-juan Chen 1 1.College of Power and Mechanical Engineering Wuhan University Wuhan,China 2.College of Computer Science and Technology Wuhan University of Science and Technology Wuhan,China
The analysis process of the classical dendritic cell algorithm(DCA)is performed offline,which has constrained its application in the area of anomaly *** order to continuously detect abnormal behaviors as soon as they ... 详细信息
来源: 评论