共 50 条
- [41] Controlling spam: Immunity-based approach INTELLIGENT INFORMATION PROCESSING AND WEB MINING, PROCEEDINGS, 2006, : 31 - +
- [44] Towards an immunity-based system for detecting masqueraders KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, PT 2, PROCEEDINGS, 2003, 2774 : 488 - 495
- [46] Immunity-based approaches for self-monitoring in distributed intrusion detection system KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, PT 2, PROCEEDINGS, 2003, 2774 : 503 - 510
- [47] Vulnerability analysis of immunity-based intrusion detection systems using evolutionary hackers GENETIC AND EVOLUTIONARY COMPUTATION - GECCO 2004, PT 1, PROCEEDINGS, 2004, 3102 : 263 - 274
- [48] Improving the performance of detection of simultaneous double faults on immunity-based system diagnosis 1600, ICIC Express Letters Office, Tokai University, Kumamoto Campus, 9-1-1, Toroku, Kumamoto, 862-8652, Japan (05): : 83 - 88
- [49] An Immunity-Based Security Threat Detection System for Cyberspace Digital Virtual Assets CLOUD COMPUTING AND SECURITY, PT II, 2018, 11064 : 601 - 611
- [50] AN EFFICIENT ALGORITHM FOR SIMULTANEOUS MULTIPLE FAULT DETECTION IN IMMUNITY-BASED SYSTEM DIAGNOSIS INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2014, 10 (05): : 1699 - 1714