共 20 条
[1]
Amor N. B., 2004, P 2004 ACM S APPL CO, P420, DOI DOI 10.1145/967900.967989
[3]
A study of evolutionary multiagent models based on symbiosis
[J].
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART B-CYBERNETICS,
2006, 36 (01)
:179-193
[4]
Applying data mining of fuzzy association rules to network intrusion detection
[J].
2006 IEEE INFORMATION ASSURANCE WORKSHOP,
2006,
:100-+
[5]
A double-deck elevator group supervisory control system using genetic network programming
[J].
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART C-APPLICATIONS AND REVIEWS,
2008, 38 (04)
:535-550
[6]
Kim DS, 2003, LECT NOTES COMPUT SC, V2662, P747
[7]
Lee W, 2001, DISCEX'01: DARPA INFORMATION SURVIVABILITY CONFERENCE & EXPOSITION II, VOL I, PROCEEDINGS, P89, DOI 10.1109/DISCEX.2001.932195
[8]
Lee W., 1998, P 1998 USENIX SEC S
[9]
Mabu S., 2010, IEEE WORLD C COMP IN