Hybrid detector set: detectors with different affinity
暂无分享,去创建一个
[1] D. Dasgupta,et al. Immunity-based systems: a survey , 1997, 1997 IEEE International Conference on Systems, Man, and Cybernetics. Computational Cybernetics and Simulation.
[2] Alan S. Perelson,et al. A Change-Detection Algorithm Inspired by the Immune System , 1995 .
[3] Stephanie Forrest,et al. Detector coverage under the r-contiguous bits matching rule , 2002 .
[4] Peter J. Bentley,et al. Negative selection and niching by an artificial immune system for network intrusion detection , 1999 .
[5] Patrik D'haeseleer,et al. An immunological approach to change detection: theoretical results , 1996, Proceedings 9th IEEE Computer Security Foundations Workshop.
[6] Paul Helman,et al. An immunological approach to change detection: algorithms, analysis and implications , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[7] Alan S. Perelson,et al. Self-nonself discrimination in a computer , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.