共 50 条
- [21] Applicability issues of the real-valued negative selection algorithms [J]. GECCO 2006: GENETIC AND EVOLUTIONARY COMPUTATION CONFERENCE, VOL 1 AND 2, 2006, : 111 - +
- [22] Anomaly detection using real-valued negative selection [J]. ISTM/2005: 6TH INTERNATIONAL SYMPOSIUM ON TEST AND MEASUREMENT, VOLS 1-9, CONFERENCE PROCEEDINGS, 2005, : 949 - 952
- [23] Intrusion Detection systems using Real-Valued Negative Selection Algorithm with Optimized Detectors [J]. 2019 5TH IRANIAN CONFERENCE ON SIGNAL PROCESSING AND INTELLIGENT SYSTEMS (ICSPIS 2019), 2019,
- [24] Exogenous parameter selection in a real-valued genetic algorithm [J]. PROCEEDINGS OF 1997 IEEE INTERNATIONAL CONFERENCE ON EVOLUTIONARY COMPUTATION (ICEC '97), 1997, : 569 - 574
- [25] Orchestrating Real-Valued Negative Selection Algorithm with Computational Efficiency for Crude Oil Price [J]. ADVANCED INTELLIGENT COMPUTING THEORIES AND APPLICATIONS, ICIC 2015, PT III, 2015, 9227 : 387 - 396
- [27] Intrusion Detection Techniques Based on cutting-based real-valued negative selection [J]. 2016 8TH INTERNATIONAL CONFERENCE ON INTELLIGENT NETWORKING AND COLLABORATIVE SYSTEMS (INCOS), 2016, : 498 - 503
- [28] Technique for Intrusion Detection based on Cutting-based Real-valued Negative Selection [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (09): : 95 - 104
- [29] Improved real-valued clonal selection algorithm based on a novel mutation method [J]. 2007 INTERNATIONAL SYMPOSIUM ON INTELLIGENT SIGNAL PROCESSING AND COMMUNICATION SYSTEMS, VOLS 1 AND 2, 2007, : 678 - 681
- [30] Real-valued Dual Negative Selection Technique for Intrusion Detection [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (04): : 279 - 288