共 14 条
[1]
Sangkatsanee P., Wattanapongsakorn N., Charnsripinyo C., Practical real-time intrusion detection using machine learning approaches, Computer Communications, 34, pp. 2227-2235, (2011)
[2]
Elshoush H.T., Alert correlation in collaborative intelligent intrusion detection systems-A survey, Applied Soft Computing, 11, pp. 4349-4365, (2011)
[3]
Amiri F., Yousefi M.M.R., Mutual information-based feature selection for intrusion detection systems, Journal of Network and Computer Applications, 34, 4, pp. 1184-1199, (2011)
[4]
Toubiana V., Labiod H., Reynaud L., A global security architecture for operated hybrid WLAN mesh networks, Computer Networks, 54, 2, pp. 218-230, (2010)
[5]
Kuby J., Immunology
[6]
Burnet F.M., The Clone Selection Theory of Acquired Immunity, (1959)
[7]
Hofmeyr S.A., Forrest S., Architecture for an artificial immune system, Evolutionary Computation, 8, pp. 443-473, (2000)
[8]
Forrest S., Perelson A.S., Allen L., Cherukuri R., Self-Nonself Discrimination in a Computer, (1994)
[9]
Atay S., Masera M., Challenges for the security analysis of Next Generation Networks, Information Security Technical Report, 16, pp. 3-11, (2011)
[10]
Mezmaz M., Melab N., Kessaci Y., A parallel bi-objective hybrid metaheuristic for energy-aware scheduling for cloud computing systems, Journal of Parallel and Distributed Computing, 71, pp. 1497-1508, (2011)