咨询与建议

限定检索结果

文献类型

  • 43 篇 会议
  • 18 篇 期刊文献

馆藏范围

  • 61 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 58 篇 工学
    • 49 篇 计算机科学与技术...
    • 15 篇 电气工程
    • 10 篇 控制科学与工程
    • 6 篇 信息与通信工程
    • 6 篇 软件工程
    • 3 篇 电子科学与技术(可...
    • 2 篇 机械工程
    • 2 篇 仪器科学与技术
    • 1 篇 力学(可授工学、理...
    • 1 篇 材料科学与工程(可...
    • 1 篇 生物医学工程(可授...
    • 1 篇 网络空间安全
  • 10 篇 管理学
    • 9 篇 管理科学与工程(可...
    • 1 篇 公共管理
  • 6 篇 理学
    • 3 篇 数学
    • 3 篇 生物学
    • 1 篇 系统科学
  • 2 篇 医学
    • 1 篇 基础医学(可授医学...
    • 1 篇 临床医学
  • 1 篇 法学
    • 1 篇 法学
  • 1 篇 农学

主题

  • 61 篇 dendritic cell a...
  • 18 篇 danger theory
  • 16 篇 artificial immun...
  • 11 篇 artificial immun...
  • 7 篇 intrusion detect...
  • 7 篇 anomaly detectio...
  • 5 篇 classification
  • 5 篇 genetic algorith...
  • 4 篇 artificial immun...
  • 3 篇 malware
  • 3 篇 ids
  • 3 篇 immune system
  • 2 篇 cyber security
  • 2 篇 fault diagnosis
  • 2 篇 immersive virtua...
  • 2 篇 behavioural dete...
  • 2 篇 signal categoris...
  • 2 篇 state awareness
  • 2 篇 netflow protocol
  • 2 篇 cyber-physical s...

机构

  • 4 篇 northumbria univ...
  • 3 篇 northumbria univ...
  • 3 篇 univ nottingham ...
  • 2 篇 sathyabama univ ...
  • 2 篇 minist def def s...
  • 2 篇 xiamen univ sch ...
  • 2 篇 school of comput...
  • 2 篇 wuhan univ comp ...
  • 2 篇 cuny city coll d...
  • 2 篇 inst super gest ...
  • 1 篇 univ portsmouth ...
  • 1 篇 college of compu...
  • 1 篇 nagarjuna coll e...
  • 1 篇 univ nottingham ...
  • 1 篇 univ manouba nat...
  • 1 篇 hsiuping inst te...
  • 1 篇 pukyong natl uni...
  • 1 篇 south cent univ ...
  • 1 篇 guangdong prov k...
  • 1 篇 univ northumbria...

作者

  • 8 篇 yang longzhi
  • 7 篇 elisa noe
  • 5 篇 greensmith julie
  • 4 篇 chao fei
  • 3 篇 chelly zeineb
  • 3 篇 naik nitin
  • 3 篇 ou chung-ming
  • 3 篇 elouedi zied
  • 2 篇 abu bakar azural...
  • 2 篇 mohsin mohamad f...
  • 2 篇 saadawi tarek
  • 2 篇 lokesh m. r.
  • 2 篇 igbe obinna
  • 2 篇 ajayi oluwaseyi
  • 2 篇 el-alfy el-sayed...
  • 2 篇 liang yiwen
  • 2 篇 kumaraswamy y. s...
  • 2 篇 aickelin uwe
  • 2 篇 hamdan abdul raz...
  • 2 篇 liu sai

语言

  • 60 篇 英文
  • 1 篇 中文
检索条件"主题词=dendritic cell algorithm"
61 条 记 录,以下是41-50 订阅
排序:
Further Exploration of the Hybrid Fuzzy-Rough dendritic cell Immune Classifier
Further Exploration of the Hybrid Fuzzy-Rough Dendritic Cell...
收藏 引用
4th IEEE International Conference on E-Health and Bioengineering (EHB)
作者: Chelly, Zeineb Elouedi, Zied Inst Super Gest Tunis LARODEC Tunis Tunisia
The performance of the Fuzzy-Rough dendritic cell immune algorithm relies on its data pre-processing phase which is based on the use of Rough Set Theory (RST). However, the developed approach presents an information l... 详细信息
来源: 评论
Outbreak detection model based on danger theory
收藏 引用
APPLIED SOFT COMPUTING 2014年 第0期24卷 612-622页
作者: Mohsin, Mohamad Farhan Mohamad Abu Bakar, Azuraliza Hamdan, Abdul Razak Univ Kebangsaan Malaysia Fac Sci & Informat Technol Ctr Artificial Intelligence Technol Data Mining & Optimizat Res Grp Bangi Selangor Malaysia
In outbreak detection, one of the key issues is the need to deal with the weakness of early outbreak signals because this causes the detection model to have has less capability in terms of robustness when unseen outbr... 详细信息
来源: 评论
Host-based intrusion detection systems adapted from agent-based artificial immune systems
收藏 引用
NEUROCOMPUTING 2012年 88卷 78-86页
作者: Ou, Chung-Ming Kainga Univ Dept Informat Management Luchu 338 Taiwan
Agent-based artificial immune system (ABAIS) is adopted to intrusion detection system (IDS). An agent-based IDS (ABIDS) inspired by the danger theory of human immune system is proposed. Multiple agents are embedded to... 详细信息
来源: 评论
Innate immune memory and its application to artificial immune systems
收藏 引用
JOURNAL OF SUPERCOMPUTING 2022年 第9期78卷 11680-11701页
作者: Wang, Dongmei Liang, Yiwen Dong, Hongbin Tan, Chengyu Xiao, Zhenhua Liu, Sai Wuhan Univ Sch Comp Sci Wuhan 430072 Peoples R China Wuhan Univ Sch Cyber Sci & Engn Wuhan 430072 Peoples R China South Cent Univ Nationalities Coll Comp Sci Wuhan 430072 Peoples R China
The study of innate immune-based algorithms is an important research domain in Artificial Immune System (AIS), such as dendritic cell algorithm (DCA), Toll-Like Receptor algorithm (TLRA). The parameters in these algor... 详细信息
来源: 评论
Improving the reliability of real-time embedded systems using innate immune techniques
收藏 引用
EVOLUTIONARY INTELLIGENCE 2008年 第2期1卷 113-132页
作者: Lay, Nicholas Bate, Iain Univ York Dept Comp Sci York N Yorkshire England
Previous work has shown that immune-inspired techniques have good potential for solving problems associated with the development of real- time embedded systems (RTES), where for various reasons traditional real-time d... 详细信息
来源: 评论
The DCA: SOMe comparison A comparative study between two biologically inspired algorithms
收藏 引用
EVOLUTIONARY INTELLIGENCE 2008年 第2期1卷 85-112页
作者: Greensmith, Julie Feyereisl, Jan Aickelin, Uwe Univ Nottingham Sch Comp Sci Wollaton Rd Nottingham NG8 1BB England
The dendritic cell algorithm (DCA) is an immune-inspired algorithm, developed for the purpose of anomaly detection. The algorithm performs multi-sensor data fusion and correlation which results in a 'context aware... 详细信息
来源: 评论
SWIM: An Effective Method to Perceive Cyberspace Situation from Honeynet
收藏 引用
ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING 2018年 第12期43卷 6863-6872页
作者: Wang, Yu Guo, Yi Zhang, Liancheng Peng, Tianqiang Henan Univ Engn Coll Comp Sci Zhengzhou Henan Peoples R China Tsinghua Univ Inst Network Sci & Cyberspace Beijing Peoples R China State Key Lab Math Engn & Adv Comp Zhengzhou Henan Peoples R China
As a traditional and impactful proactive defense technology, honeynet is used by network defender to imitate normal production process, which traps and captures the behavior of attackers in order to analyze the method... 详细信息
来源: 评论
KEYLOGGERS SOFTWARE DETECTION TECHNIQUES  10
KEYLOGGERS SOFTWARE DETECTION TECHNIQUES
收藏 引用
10th International Conference on Intelligent Systems and Control (ISCO)
作者: Solairaj, A. Prabanand, S. C. Mathalairaj, J. Prathap, C. Vignesh, L. S. Nadar Saraswathi Coll Engn & Technol Theni Tamil Nadu India
Keyloggers is the action of recording the key stroke on a keyboard, typically in a covert manner. Software Keyloggers are detected based on the behavioral characteristics. They don't provide root privileges;detect... 详细信息
来源: 评论
Modified Danger Theory based Optimized Artificial Immune Network on Resiliency in Cyber-Physical System  1
Modified Danger Theory based Optimized Artificial Immune Net...
收藏 引用
International Conference on Green Computing and Internet of Things (ICGCIoT)
作者: Lokesh, M. R. Kumaraswamy, Y. S. Sathyabama Univ Dept Comp Sci & Engn Madras Tamil Nadu India Nagarjuna Coll Engn & Technol Dept Comp Sci & Engn Bangalore Karnataka India
Resiliency plays major role in developing reliable and robustness in cyber-physical system where the environment is diverse in nature. The cyber-physical system is model with Multi Agent Paradigm and biological inspir... 详细信息
来源: 评论
Classifying in the Presence of Uncertainty: A DCA Perspective
收藏 引用
9th International Conference on Artificial Immune Systems (ICARIS 2010)
作者: Oates, Robert Kendall, Graham Garibaldi, Jonathan M. Univ Nottingham Sch Comp Sci Nottingham NG7 2RD England
The dendritic cell algorithm is often presented as an immune-inspired one class classifier. Recently the dendritic cell algorithm has been criticised as its current decision making stage has many serious mathematical ... 详细信息
来源: 评论