共 20 条
[1]
Abdelhaq Maha, 2011, International Journal of New Computer Architectures and their Applications, V1, P534
[2]
Abdelhaq M, 2011, COMM COM INF SC, V181, P429
[3]
Aickelin U, 2003, LECT NOTES COMPUT SC, V2787, P147
[4]
Aickelin U., 2008, DANGER THEORY ITS AP
[5]
[Anonymous], 2004, IMMUNITY BASED SYSTE
[7]
Chaki N., 2014, NTRUSION DETECTION W
[8]
DASGUPTA D, 2003, GEN EV COMP C GECCO
[9]
De Castro L. N., 2000, IN P GECCO, P36, DOI DOI 10.1109/HIS.2008.11
[10]
Forrest S., 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy (Cat. No.94CH3444-7), P202, DOI 10.1109/RISP.1994.296580