咨询与建议

限定检索结果

文献类型

  • 43 篇 会议
  • 18 篇 期刊文献

馆藏范围

  • 61 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 58 篇 工学
    • 49 篇 计算机科学与技术...
    • 15 篇 电气工程
    • 10 篇 控制科学与工程
    • 6 篇 信息与通信工程
    • 6 篇 软件工程
    • 3 篇 电子科学与技术(可...
    • 2 篇 机械工程
    • 2 篇 仪器科学与技术
    • 1 篇 力学(可授工学、理...
    • 1 篇 材料科学与工程(可...
    • 1 篇 生物医学工程(可授...
    • 1 篇 网络空间安全
  • 10 篇 管理学
    • 9 篇 管理科学与工程(可...
    • 1 篇 公共管理
  • 6 篇 理学
    • 3 篇 数学
    • 3 篇 生物学
    • 1 篇 系统科学
  • 2 篇 医学
    • 1 篇 基础医学(可授医学...
    • 1 篇 临床医学
  • 1 篇 法学
    • 1 篇 法学
  • 1 篇 农学

主题

  • 61 篇 dendritic cell a...
  • 18 篇 danger theory
  • 16 篇 artificial immun...
  • 11 篇 artificial immun...
  • 7 篇 intrusion detect...
  • 7 篇 anomaly detectio...
  • 5 篇 classification
  • 5 篇 genetic algorith...
  • 4 篇 artificial immun...
  • 3 篇 malware
  • 3 篇 ids
  • 3 篇 immune system
  • 2 篇 cyber security
  • 2 篇 fault diagnosis
  • 2 篇 immersive virtua...
  • 2 篇 behavioural dete...
  • 2 篇 signal categoris...
  • 2 篇 state awareness
  • 2 篇 netflow protocol
  • 2 篇 cyber-physical s...

机构

  • 4 篇 northumbria univ...
  • 3 篇 northumbria univ...
  • 3 篇 univ nottingham ...
  • 2 篇 sathyabama univ ...
  • 2 篇 minist def def s...
  • 2 篇 xiamen univ sch ...
  • 2 篇 school of comput...
  • 2 篇 wuhan univ comp ...
  • 2 篇 cuny city coll d...
  • 2 篇 inst super gest ...
  • 1 篇 univ portsmouth ...
  • 1 篇 college of compu...
  • 1 篇 nagarjuna coll e...
  • 1 篇 univ nottingham ...
  • 1 篇 univ manouba nat...
  • 1 篇 hsiuping inst te...
  • 1 篇 pukyong natl uni...
  • 1 篇 south cent univ ...
  • 1 篇 guangdong prov k...
  • 1 篇 univ northumbria...

作者

  • 8 篇 yang longzhi
  • 7 篇 elisa noe
  • 5 篇 greensmith julie
  • 4 篇 chao fei
  • 3 篇 chelly zeineb
  • 3 篇 naik nitin
  • 3 篇 ou chung-ming
  • 3 篇 elouedi zied
  • 2 篇 abu bakar azural...
  • 2 篇 mohsin mohamad f...
  • 2 篇 saadawi tarek
  • 2 篇 lokesh m. r.
  • 2 篇 igbe obinna
  • 2 篇 ajayi oluwaseyi
  • 2 篇 el-alfy el-sayed...
  • 2 篇 liang yiwen
  • 2 篇 kumaraswamy y. s...
  • 2 篇 aickelin uwe
  • 2 篇 hamdan abdul raz...
  • 2 篇 liu sai

语言

  • 60 篇 英文
  • 1 篇 中文
检索条件"主题词=dendritic cell algorithm"
61 条 记 录,以下是31-40 订阅
排序:
A dendritic cell algorithm Based Approach for Malicious TCP Port Scanning Detection  15
A Dendritic Cell Algorithm Based Approach for Malicious TCP ...
收藏 引用
15th IEEE International Wireless Communications and Mobile Computing Conference (IEEE IWCMC)
作者: Almasalmeh, Nuha Saidi, Firas Trabelsi, Zouheir United Arab Emirates Univ Coll Informat Technol Al Ain U Arab Emirates Univ Manouba Natl Sch Comp Sci Manouba Tunisia
The proliferation of cyber-attacks brings up an urgent need to develop sophisticated detection tools. Some of these tools are based on algorithms inspired from the Human Immune System (HIS). The dendritic cell Algorit... 详细信息
来源: 评论
The Significant Effect of Feature Selection Methods in Spam Risk Assessment Using dendritic cell algorithm  5
The Significant Effect of Feature Selection Methods in Spam ...
收藏 引用
5th International Conference on Information and Communication Technology (ICoIC7)
作者: Zainal, Kamahazira Jali, Mohd Zalisham Univ Sains Islam Malaysia Fac Sci & Technol Nilai N Sembilan Malaysia
The vast amount of online documentation and the thriving of Internet especially mobile technology have caused a crucial demand to handle and organize unstructured data appropriately. An information retrieval or even k... 详细信息
来源: 评论
Detecting Denial of Service Attacks using a Combination of dendritic cell algorithm and the Negative Selection algorithm  2
Detecting Denial of Service Attacks using a Combination of D...
收藏 引用
2nd IEEE International Conference on Smart Cloud (SmartCloud)
作者: Igbe, Obinna Ajayi, Oluwaseyi Saadawi, Tarek CUNY City Coll Dept Elect Engn New York NY 10031 USA
As one of the most common and aggressive means, denial-of-service (DoS) attacks cause serious impact on computing systems and networks. This paper presents a system for detecting denial of service (DoS) attacks in a n... 详细信息
来源: 评论
A scalable and distributed dendritic cell algorithm for big data classification
收藏 引用
SWARM AND EVOLUTIONARY COMPUTATION 2019年 50卷 100432-000页
作者: Dagdia, Zaineb Chelly Aberystwyth Univ Dept Comp Sci Aberystwyth Dyfed Wales Inst Super Gest Tunis LARODEC Tunis Tunisia
In the era of big data, scaling evolution up to large-scale data sets is a very interesting and challenging task. The application of standard biological systems in such data sets is not straightforward. Therefore, a n... 详细信息
来源: 评论
Multiresolution dendritic cell algorithm for network detection
收藏 引用
PEERJ COMPUTER SCIENCE 2021年 7卷 e749页
作者: Limon-Cantu, David Alarcon-Aquino, Vicente Univ Americas Puebla Dept Comp Elect & Mech Cholula Mexico
Anomaly detection in computer networks is a complex task that requires the distinction of normality and anomaly. Network attack detection in information systems is a constant challenge in computer security research, a... 详细信息
来源: 评论
Towards Bio-Inspired Anomaly Detection Using the Cursory dendritic cell algorithm
收藏 引用
algorithmS 2022年 第1期15卷 1页
作者: Pinto, Carlos Pinto, Rui Goncalves, Gil Univ Porto Fac Engn Rua Dr Roberto Frias S-N P-4200465 Porto Portugal SYSTEC Res Ctr Syst & Technol Rua Dr Roberto Frias S-NOff i219 P-4200465 Porto Portugal
The autonomous and adaptable identification of anomalies in industrial contexts, particularly in the physical processes of Cyber-Physical Production Systems (CPPS), requires using critical technologies to identify fai... 详细信息
来源: 评论
Principle and Application of dendritic cell algorithm for Intrusion Detection
Principle and Application of Dendritic Cell Algorithm for In...
收藏 引用
2011 3rd International Conference on Signal Processing Systems(ICSPS 2011)
作者: Xufei Zheng Yonghui Fang College of Computer Science Sichuan University School of Electronic and Information Engineering Southwest University
The dendritic cell algorithm (DCA) is inspired by the function of the dendritic cells of the human immune system. In nature, dendritic cells are the intrusion detection agents of the human body, policing the tissue an... 详细信息
来源: 评论
Fault Diagnosis Research of Rotating Machinery Based on dendritic cell algorithm
Fault Diagnosis Research of Rotating Machinery Based on Dend...
收藏 引用
IEEE International Conference on Information and Automation
作者: Delong Cui Qinghua Zhang Jianbin Xiong Qinxue Li Mei Liu College of Computer and Electronic Information Guangdong University of Petrochemical Technology
Rotating machinery play an important role in modern industry. Ensuring security and reliability of manufacture equipments has been receiving more and more recognition. This paper proposes an innovative techniques for ... 详细信息
来源: 评论
A New Cryptojacking Malware Classifier Model Based on dendritic cell algorithm  2019
A New Cryptojacking Malware Classifier Model Based on Dendri...
收藏 引用
Proceedings of the 3rd International Conference on Vision, Image and Signal Processing
作者: Azuan Ahmad Wan Shafiuddin Mohd Nazri Kama Madihah Mohd Saudi Islamic Science Institute Universiti Sains Islam Malaysia Negeri Sembilan Malaysia Zainudin CyberSecurity Malaysia Seri Kembangan Selangor Malaysia Saiful Adli Bin Ismail Fakulti Teknologi dan Informatik Razak Universiti Teknologi Malaysia
A new threat known as "cryptojacking" has entered the picture where cryptojacking malware is the future trend for cyber criminals, who infect victim's device, install cryptojacking malware, and use the s... 详细信息
来源: 评论
A dendritic cell algorithm for Real-Time Anomaly Detection
A Dendritic Cell Algorithm for Real-Time Anomaly Detection
收藏 引用
2012 IEEE International Conference on Computer Science and Automation Engineering(CSAE 2012)
作者: Song Yuan 1,2 ,Qi-juan Chen 1 1.College of Power and Mechanical Engineering Wuhan University Wuhan,China 2.College of Computer Science and Technology Wuhan University of Science and Technology Wuhan,China
The analysis process of the classical dendritic cell algorithm(DCA)is performed offline,which has constrained its application in the area of anomaly *** order to continuously detect abnormal behaviors as soon as they ... 详细信息
来源: 评论