共 50 条
- [1] Intrusion detection based on immune clonal selection algorithms [J]. AI 2004: ADVANCES IN ARTIFICIAL INTELLIGENCE, PROCEEDINGS, 2004, 3339 : 1226 - 1232
- [2] Survey of Intrusion Detection Methods Based on Data Mining Algorithms [J]. BDE 2019: 2019 INTERNATIONAL CONFERENCE ON BIG DATA ENGINEERING, 2019, : 92 - 100
- [4] Artificial immune theory based network intrusion detection system and the algorithms design [J]. 2002 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-4, PROCEEDINGS, 2002, : 73 - 77
- [5] Evaluating Artificial Immune System Algorithms for Intrusion Detection [J]. PROCEEDINGS OF THE 2020 FOURTH WORLD CONFERENCE ON SMART TRENDS IN SYSTEMS, SECURITY AND SUSTAINABILITY (WORLDS4 2020), 2020, : 92 - 97
- [6] Application of PSVM and data processing for intrusion detection [J]. DYNAMICS OF CONTINUOUS DISCRETE AND IMPULSIVE SYSTEMS-SERIES B-APPLICATIONS & ALGORITHMS, 2007, 14 : 627 - 633
- [7] A REVIEW OF HUMAN IMMUNE INSPIRED ALGORITHMS FOR INTRUSION DETECTION SYSTEMS [J]. 2022 IEEE WORLD AI IOT CONGRESS (AIIOT), 2022, : 364 - 371
- [8] A model of evolving intrusion detection system based on data mining and immune principle [J]. TENCON 2004 - 2004 IEEE REGION 10 CONFERENCE, VOLS A-D, PROCEEDINGS: ANALOG AND DIGITAL TECHNIQUES IN ELECTRICAL ENGINEERING, 2004, : B199 - B202
- [9] Artificial Immune Detection for Network Intrusion Data Based on Quantitative Matching Method [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2024, 78 (02): : 2361 - 2389
- [10] An intrusion detection systembased on data mining and immune principles [J]. 2002 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-4, PROCEEDINGS, 2002, : 524 - 528