Soft Computing Techniques for Internet Backbone Traffic Anomaly Detection
暂无分享,去创建一个
[1] Pascal Bouvry,et al. Anomaly detection in TCP/IP networks using immune systems paradigm , 2007, Comput. Commun..
[2] Fernando José Von Zuben,et al. Immune and Neural Network Models: Theoretical and Empirical Comparisons , 2001, Int. J. Comput. Intell. Appl..
[3] Fernando José Von Zuben,et al. Learning and optimization using the clonal selection principle , 2002, IEEE Trans. Evol. Comput..
[4] Marco Dorigo,et al. Swarm intelligence: from natural to artificial systems , 1999 .
[5] Alan S. Perelson,et al. Self-nonself discrimination in a computer , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.
[6] Gérard Dreyfus,et al. Neural networks - methodology and applications , 2005 .
[7] Julie Greensmith,et al. Immune system approaches to intrusion detection – a review , 2004, Natural Computing.
[8] Alex Alves Freitas,et al. Revisiting the Foundations of Artificial Immune Systems for Data Mining , 2007, IEEE Transactions on Evolutionary Computation.
[9] Riccardo Poli,et al. Genetic and Evolutionary Computation – GECCO 2004 , 2004, Lecture Notes in Computer Science.
[10] Zhou Ji,et al. Real-Valued Negative Selection Algorithm with Variable-Sized Detectors , 2004, GECCO.
[11] Mo-Yuen Chow,et al. A neural networks-based negative selection algorithm in fault diagnosis , 2007, Neural Computing and Applications.
[12] Fernando Niño,et al. A Framework for Evolving Multi-Shaped Detectors in Negative Selection , 2007, 2007 IEEE Symposium on Foundations of Computational Intelligence.
[13] Balachander Krishnamurthy,et al. Flash crowds and denial of service attacks: characterization and implications for CDNs and web sites , 2002, WWW.
[14] James Kennedy,et al. Particle swarm optimization , 2002, Proceedings of ICNN'95 - International Conference on Neural Networks.