Securing Relational Databases with an Artificial Immunity Features
暂无分享,去创建一个
[1] Ayman Mohamed Mostafa,et al. Design and implementation of multi-layer policies for database security , 2013 .
[2] Alan S. Perelson,et al. Self-nonself discrimination in a computer , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.
[3] Xin Wang,et al. A Novel Negative Selection Algorithm with an Array of Partial Matching Lengths for Each Detector , 2006, PPSN.
[4] Ayman Mohamed Mostafa,et al. Interactive multi-layer policies for securing relational databases , 2012, International Conference on Information Society (i-Society 2012).
[5] Kamalrulnizam Abu Bakar,et al. Survey on Artificial Immune System as a Bio-inspired Technique for Anomaly Based Intrusion Detection Systems , 2010, 2010 International Conference on Intelligent Networking and Collaborative Systems.
[6] Salah Al-Sharhan,et al. ARTIFICIAL IMMUNE SYSTEMS - MODELS, ALGORITHMS AND APPLICATIONS , 2010 .
[7] Ayman Mohamed Mostafa,et al. Design and Implementation of Extensible Service-Oriented Algorithms for Securing Relational Databases , 2013 .
[8] Fernando José Von Zuben,et al. Learning and optimization using the clonal selection principle , 2002, IEEE Trans. Evol. Comput..
[9] Zhou Ji,et al. Revisiting Negative Selection Algorithms , 2007, Evolutionary Computation.
[10] Wenjian Luo,et al. On convergence of Evolutionary Negative Selection Algorithms for anomaly detection , 2008, 2008 IEEE Congress on Evolutionary Computation (IEEE World Congress on Computational Intelligence).
[11] Chung-Ming Ou,et al. Host-based intrusion detection systems adapted from agent-based artificial immune systems , 2012, Neurocomputing.
[12] Fernando José Von Zuben,et al. omni-aiNet: An Immune-Inspired Approach for Omni Optimization , 2006, ICARIS.
[13] Chenggong Zhang,et al. An Artificial Immune Network Model Applied to Data Clustering and Classification , 2007, ISNN.
[14] Fernando Niño,et al. Recent Advances in Artificial Immune Systems: Models and Applications , 2011, Appl. Soft Comput..
[15] Claudia Eckert,et al. Is negative selection appropriate for anomaly detection? , 2005, GECCO '05.
[16] J Timmis,et al. An artificial immune system for data analysis. , 2000, Bio Systems.
[17] Jiqiang Zhai,et al. Design and Implementation , 2011 .