咨询与建议

限定检索结果

文献类型

  • 43 篇 会议
  • 18 篇 期刊文献

馆藏范围

  • 61 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 58 篇 工学
    • 49 篇 计算机科学与技术...
    • 15 篇 电气工程
    • 10 篇 控制科学与工程
    • 6 篇 信息与通信工程
    • 6 篇 软件工程
    • 3 篇 电子科学与技术(可...
    • 2 篇 机械工程
    • 2 篇 仪器科学与技术
    • 1 篇 力学(可授工学、理...
    • 1 篇 材料科学与工程(可...
    • 1 篇 生物医学工程(可授...
    • 1 篇 网络空间安全
  • 10 篇 管理学
    • 9 篇 管理科学与工程(可...
    • 1 篇 公共管理
  • 6 篇 理学
    • 3 篇 数学
    • 3 篇 生物学
    • 1 篇 系统科学
  • 2 篇 医学
    • 1 篇 基础医学(可授医学...
    • 1 篇 临床医学
  • 1 篇 法学
    • 1 篇 法学
  • 1 篇 农学

主题

  • 61 篇 dendritic cell a...
  • 18 篇 danger theory
  • 16 篇 artificial immun...
  • 11 篇 artificial immun...
  • 7 篇 intrusion detect...
  • 7 篇 anomaly detectio...
  • 5 篇 classification
  • 5 篇 genetic algorith...
  • 4 篇 artificial immun...
  • 3 篇 malware
  • 3 篇 ids
  • 3 篇 immune system
  • 2 篇 cyber security
  • 2 篇 fault diagnosis
  • 2 篇 immersive virtua...
  • 2 篇 behavioural dete...
  • 2 篇 signal categoris...
  • 2 篇 state awareness
  • 2 篇 netflow protocol
  • 2 篇 cyber-physical s...

机构

  • 4 篇 northumbria univ...
  • 3 篇 northumbria univ...
  • 3 篇 univ nottingham ...
  • 2 篇 sathyabama univ ...
  • 2 篇 minist def def s...
  • 2 篇 xiamen univ sch ...
  • 2 篇 school of comput...
  • 2 篇 wuhan univ comp ...
  • 2 篇 cuny city coll d...
  • 2 篇 inst super gest ...
  • 1 篇 univ portsmouth ...
  • 1 篇 college of compu...
  • 1 篇 nagarjuna coll e...
  • 1 篇 univ nottingham ...
  • 1 篇 univ manouba nat...
  • 1 篇 hsiuping inst te...
  • 1 篇 pukyong natl uni...
  • 1 篇 south cent univ ...
  • 1 篇 guangdong prov k...
  • 1 篇 univ northumbria...

作者

  • 8 篇 yang longzhi
  • 7 篇 elisa noe
  • 5 篇 greensmith julie
  • 4 篇 chao fei
  • 3 篇 chelly zeineb
  • 3 篇 naik nitin
  • 3 篇 ou chung-ming
  • 3 篇 elouedi zied
  • 2 篇 abu bakar azural...
  • 2 篇 mohsin mohamad f...
  • 2 篇 saadawi tarek
  • 2 篇 lokesh m. r.
  • 2 篇 igbe obinna
  • 2 篇 ajayi oluwaseyi
  • 2 篇 el-alfy el-sayed...
  • 2 篇 liang yiwen
  • 2 篇 kumaraswamy y. s...
  • 2 篇 aickelin uwe
  • 2 篇 hamdan abdul raz...
  • 2 篇 liu sai

语言

  • 60 篇 英文
  • 1 篇 中文
检索条件"主题词=dendritic cell algorithm"
61 条 记 录,以下是51-60 订阅
排序:
Accelerating Cyber-Breach Investigations Through Novel Use of Artificial Immune System algorithms  42nd
Accelerating Cyber-Breach Investigations Through Novel Use o...
收藏 引用
42nd SGAI International Conference on Innovative Techniques and Applications of Artificial Intelligence
作者: Donnachie, Benjamin Verrall, Jason Hopgood, Adrian Wong, Patrick Kennedy, Ian Open Univ Walton Hall Milton Keynes England Univ Portsmouth Winston Churchill Ave Portsmouth England
The use of artificial immune systems for investigation of cyber-security breaches is presented. Manual reviews of disk images are impractical because of the size of the dataset. Machine-learning algorithms for detecti... 详细信息
来源: 评论
Danger Theory or Trained Neural Network - A Comparative Study for Behavioural Detection  10
Danger Theory or Trained Neural Network - A Comparative Stud...
收藏 引用
Joint 10th International Conference on Soft Computing and Intelligent Systems (SCIS) / 19th International Symposium on Advanced Intelligent Systems (ISIS)
作者: Lau, Henry Y. K. Lee, Nicole M. Y. Univ Hong Kong Dept Ind & Mfg Syst Engn Pokfulam Hong Kong Peoples R China
Danger Theory stipulates a powerful defensive mechanism underpinning the human immune system, which is a sophisticated classification metaphor, namely, dendritic cell algorithm (DCA) which has been demonstrated in man... 详细信息
来源: 评论
An Immune Intelligent Approach for Security Assurance
An Immune Intelligent Approach for Security Assurance
收藏 引用
International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA)
作者: Enache, Adriana-Cristina Ionita, Mihai Sgarciu, Valentin Univ Politehn Fac Automat Control & Comp Sci Bucharest Romania Mil Tech Acad Fac Comp Sci Bucharest Romania
Information Security Assurance implies ensuring the integrity, confidentiality and availability of critical assets for an organization. The large amount of events to monitor in a fluid system in terms of topology and ... 详细信息
来源: 评论
A Sense of 'Danger' for Windows Processes
A Sense of 'Danger' for Windows Processes
收藏 引用
8th International Conference on Artificial Immune Systems
作者: Manzoor, Salman Shafiq, M. Zubair Tabish, S. Momina Farooq, Muddassar NUCES FAST Next Generat Intelligent Networks Res Ctr NexGIN Islamabad 44000 Pakistan
The sophistication of modern computer malware demands run-time malware detection strategies which are not only efficient but also robust to obfuscation and evasion attempts. In this paper;we investigate the suitabilit... 详细信息
来源: 评论
Intrusion Detection Systems Adapted from Agent-based Artificial Immune Systems
Intrusion Detection Systems Adapted from Agent-based Artific...
收藏 引用
IEEE International Conference on Fuzzy Systems (FUZZ 2011)
作者: Ou, Chung-Ming Wang, Yao-Tien Ou, C. R. Kainan Univ Dept Informat Management Luchu 33857 Taiwan Hungkuang Univ Dept Comp Sci & Informat Engn Taichung Taiwan Hsiuping Inst Technol Dept Elect Engn Taichung Taiwan
Agent-based artificial immune system (ABAIS) is applied to intrusion detection systems (IDS). A multiagent-based IDS (ABIDS) inspired by the danger theory of human immune system is proposed. The intelligence behind AB... 详细信息
来源: 评论
Securing the Internet of Things with Responsive Artificial Immune Systems  15
Securing the Internet of Things with Responsive Artificial I...
收藏 引用
17th Genetic and Evolutionary Computation Conference (GECCO)
作者: Greensmith, Julie Univ Nottingham Sch Comp Sci Nottingham NG8 1BB England
The Internet of Things is a network of 'smart' objects, transforming everyday objects into entities which can measure, sense and understand their environment. The devices are uniquely identifiable, rely on nea... 详细信息
来源: 评论
Design of TCP SYN Flood DDoS Attack Detection Using Artificial Immune Systems  6
Design of TCP SYN Flood DDoS Attack Detection Using Artifici...
收藏 引用
6th International Conference on System Engineering and Technology (ICSET)
作者: Ramadhan, Gilang Kurniawan, Yusuf Kim, Chang-Soo Inst Teknol Bandung Sch Elect Engn & Informat Jalan Ganesha 10 Bandung Indonesia Pukyong Natl Univ 45 Yongso Ro Busan South Korea
TCP Flood DDoS attack is one of the most commonly-used attacks. DDoS has a huge impact on the victim because DDoS attack can multiply the power of attack and makes the victim server unavailable for the normal user. Re... 详细信息
来源: 评论
An Efficient Botnet Detection System for P2P Botnet
An Efficient Botnet Detection System for P2P Botnet
收藏 引用
IEEE International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET)
作者: Thangapandiyan, M. Anand, P. M. Rubesh Hindustan Univ Dept Elect & Commun Engn Madras Tamil Nadu India
Peer-to-Peer (P2P) botnets are exploited by the botmasters for their resiliency against the take down efforts. As the modern botnets are stealthier, the traditional botnet detection approaches are not suitable for the... 详细信息
来源: 评论
The Designation of Bio-Inspired Intrusion Detection System Model in Cloud Computing Based on Machine Learning
The Designation of Bio-Inspired Intrusion Detection System M...
收藏 引用
2015 International Conference on Automation,Mechanical Control and Computational Engineering(AMCCE 2015)
作者: Yufei Ge Hong Liang Lin Chen Qian Zhang College of Computer and Communication Engineering China University of Petroleum
The paper proposed a new model by applying bio-inspired theory into intrusion detection system in cloud computing. dendritic cell algorithm(DCA) based on Danger Theory get involved in the model designation in allusion... 详细信息
来源: 评论
Danger Theory or Trained Neural Network - A Comparative Study for Behavioural Detection
Danger Theory or Trained Neural Network - A Comparative Stud...
收藏 引用
International Symposium on Advanced Intelligent Systems
作者: Henry Y. K. Lau Nicole M. Y. Lee University of Hong Kong Hong Kong HK
Danger Theory stipulates a powerful defensive mechanism underpinning the human immune system, which is a sophisticated classification metaphor, namely, dendritic cell algorithm (DCA) which has been demonstrated in man... 详细信息
来源: 评论