咨询与建议

限定检索结果

文献类型

  • 4 篇 会议
  • 2 篇 期刊文献

馆藏范围

  • 6 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 6 篇 工学
    • 5 篇 计算机科学与技术...
    • 1 篇 仪器科学与技术
    • 1 篇 信息与通信工程
    • 1 篇 控制科学与工程
    • 1 篇 软件工程
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...

主题

  • 6 篇 positive selecti...
  • 4 篇 artificial immun...
  • 3 篇 negative selecti...
  • 2 篇 artificial immun...
  • 2 篇 i/o request pack...
  • 2 篇 malware detectio...
  • 1 篇 botnet
  • 1 篇 botnet detection
  • 1 篇 narx
  • 1 篇 fdi attacks
  • 1 篇 tmr-based angula...
  • 1 篇 approximate stri...
  • 1 篇 sensor spoofing ...
  • 1 篇 acps
  • 1 篇 noisy learning
  • 1 篇 bot
  • 1 篇 botnet's evasion...
  • 1 篇 tcm
  • 1 篇 cyber-attacks
  • 1 篇 label propagatio...

机构

  • 1 篇 khmelnitsky natl...
  • 1 篇 sichuan univ sch...
  • 1 篇 xiamen univ tech...
  • 1 篇 school of comput...
  • 1 篇 school of comput...
  • 1 篇 dongguan univ te...
  • 1 篇 rheinland pfalz ...
  • 1 篇 zhihuiyuntian in...
  • 1 篇 tennessee state ...

作者

  • 1 篇 ying ma
  • 1 篇 kryshchuk andrii
  • 1 篇 alraho senan
  • 1 篇 ma ying
  • 1 篇 zein-sabatto sal...
  • 1 篇 gerken elena
  • 1 篇 zaman qummar
  • 1 篇 koenig andreas
  • 1 篇 lysenko sergii
  • 1 篇 savenko oleg
  • 1 篇 savenko bohdan
  • 1 篇 wang changzhi
  • 1 篇 alsulami abdulaz...
  • 1 篇 fuyong zhang
  • 1 篇 chen wen
  • 1 篇 zhang fuyong
  • 1 篇 bobrovnikova kir...

语言

  • 5 篇 英文
  • 1 篇 德文
检索条件"主题词=positive selection algorithm"
6 条 记 录,以下是1-10 订阅
排序:
Integrated Negative selection algorithm and positive selection algorithm for Malware Detection  4
Integrated Negative Selection Algorithm and Positive Selecti...
收藏 引用
4th IEEE International Conference on Progress in Informatics and Computing (IEEE PIC)
作者: Zhang, Fuyong Ma, Ying Dongguan Univ Technol Sch Comp Sci & Network Secur Dongguan Peoples R China Xiamen Univ Technol Sch Comp & Informat Engn Xiamen Peoples R China
Run-time malware detection strategies are efficient and robust, which get more and more attention. In this paper, we use I/O Request Package (IRP) sequences for malware detection. N-gram will be used to analyze IRP se... 详细信息
来源: 评论
Integrated Negative selection algorithm and positive selection algorithm for Malware Detection
Integrated Negative Selection Algorithm and Positive Selecti...
收藏 引用
2016 IEEE International Conference on Progress in Informatics and Computing
作者: Fuyong Zhang Ying Ma School of Computer Science and Network Security Dongguan University of Technology School of Computer and Information Engineering Xiamen University of Technology
Run-time malware detection strategies are efficient and robust, which get more and more attention. In this paper, we use I/O Request Package(IRP) sequences for malware detection. N-gram will be used to analyze IRP s... 详细信息
来源: 评论
Development of a Self-X Sensory Electronics for Anomaly Detection and its Conceptual Implementation on an XMR-based Angular Decoder Prototype
收藏 引用
TM-TECHNISCHES MESSEN 2023年 第1期90卷 20-26页
作者: Gerken, Elena Zaman, Qummar Alraho, Senan Koenig, Andreas Rheinland Pfalz Tech Univ Kaiserslautern Landau Lehrstuhl Kognit Integrierte Sensorsyst KISE Fachbereich Elektrotech & Informat Tech Erwin Schrodinger Str D-67663 Kaiserslautern Germany
Efficient fault diagnosis, early anomaly detection, and prevention of equipment failures are crucial for reducing production costs and minimizing unplanned downtime. This paper focuses on developing a self-X system us... 详细信息
来源: 评论
Resilient Cyber-Security Approach For Aviation Cyber-Physical Systems Protection Against Sensor Spoofing Attacks  11
Resilient Cyber-Security Approach For Aviation Cyber-Physica...
收藏 引用
IEEE 11th Annual Computing and Communication Workshop and Conference (CCWC)
作者: Alsulami, Abdulaziz A. Zein-Sabatto, Saleh Tennessee State Univ Dept Elect & Comp Engn Nashville TN 37203 USA
The aviation industries are transitioning from conventional aircraft systems to Aviation Cyber-Physical Systems (ACPS) based aircraft. However, like any Cyber-Physical Systems (CPS), the ACPS are vulnerable to cyber-a... 详细信息
来源: 评论
Information Technology for Botnets Detection Based on Their Behaviour in the Corporate Area Network  24th
收藏 引用
24th International Conference on Computer Networks (CN)
作者: Lysenko, Sergii Savenko, Oleg Bobrovnikova, Kira Kryshchuk, Andrii Savenko, Bohdan Khmelnitsky Natl Univ Dept Comp Engn & Syst Programming Instytutska 11 Khmelnitsky Ukraine
A new information technology for botnets detection based on the analysis of the botnets' behaviour in the corporate area network is proposed. Botnets detection is performing combining two ways: using network-level... 详细信息
来源: 评论
Combine labeled and unlabeled data for immune detector training with label propagation
收藏 引用
KNOWLEDGE-BASED SYSTEMS 2022年 第0期236卷 107661-107661页
作者: Chen Wen Wang Changzhi Sichuan Univ Sch Cyber Sci & Engn Chengdu Peoples R China Zhihuiyuntian Inc Artificial Intelligence Ctr Chengdu Peoples R China
Artificial immune detectors are the basic recognition components of immune systems. Traditionally, the candidate non-self detectors are compared with the whole self training set to eliminate self reactive ones in nega... 详细信息
来源: 评论