Intelligent detector and related algorithms based on immune danger theory

被引:0
|
作者
Tan, Minsheng [1 ]
Bai, Yaohua [1 ]
Zhou, Huan [1 ]
Liu, Jianxue [1 ]
机构
[1] School of Computer Science and Technology, University of South China, Hengyang,Hunan,421001, China
来源
Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition) | 2015年 / 43卷 / 05期
关键词
Compendex;
D O I
10.13245/j.hust.150504
中图分类号
学科分类号
摘要
Network layers
引用
收藏
页码:17 / 22
相关论文
共 50 条
  • [1] Rockbolts Detection Based on Immune Danger Theory
    Sun, Xiaoyun
    Zhao, Yang
    Zhang, Tianyuan
    Liu, Donghui
    2013 NINTH INTERNATIONAL CONFERENCE ON NATURAL COMPUTATION (ICNC), 2013, : 713 - 717
  • [2] A Novel Artificial Immune Algorithm Based on Danger Theory
    Lu, Hong
    Wei, Wei
    PROCEEDINGS OF THE 2012 24TH CHINESE CONTROL AND DECISION CONFERENCE (CCDC), 2012, : 3748 - 3750
  • [3] Mimicry Detection Method Based on Immune Danger Theory
    Tan, Min-sheng
    Cai, Chang
    Zhou, Huan
    Ding, Lin
    14TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM 2018), 2018, 306 : 521 - 530
  • [4] Danger Theory and Intelligent Data Processing
    Iqbal, Anjum
    Maarof, Mohd Aizaini
    PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 3, 2005, 3 : 110 - 113
  • [5] Intelligent Fraudulent Detection System Based SVM And Optimized By Danger Theory
    Rajak, Isha
    Mathai, K. James
    2015 INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATION AND CONTROL (IC4), 2015,
  • [6] NETWORK PROACTIVE DEFENSE MODEL BASED ON IMMUNE DANGER THEORY
    Wang, Yu
    Wang, Zhenxing
    Zhang, Liancheng
    Kong, Yazhou
    COMPUTING AND INFORMATICS, 2015, 34 (05) : 1089 - 1112
  • [7] A Danger-Theory-Based Immune Network Optimization Algorithm
    Zhang, Ruirui
    Li, Tao
    Xiao, Xin
    Shi, Yuanquan
    SCIENTIFIC WORLD JOURNAL, 2013,
  • [8] Research of network intrusion detection based on immune danger theory
    School of Computer, Sichuan University, Chengdu 610064, China
    Nanjing Youdian Daxue Xuebao (Ziran Kexue Ban), 2006, 5 (80-85):
  • [9] Artificial immune danger theory based model for network security evaluation
    Sun F.
    Journal of Networks, 2011, 6 (02) : 255 - 262
  • [10] Research on AMU Fault Detection Algorithm Based on Immune Danger Theory
    Zhou Dexin
    Fan Zhicheng
    Zhang Wenlin
    2011 CHINESE CONTROL AND DECISION CONFERENCE, VOLS 1-6, 2011, : 1957 - 1961