A Computer Virus Detecting Model based on Artificial Immune and Key Code
暂无分享,去创建一个
Zhang Li | Lou Fang | Xie Bin | He Zhi Qiang | Dong Zhi Xin | Lou Fang | Zhang Li | Xie Bin | H. Qiang | Dong Zhi Xin
[1] Nathalie Japkowicz,et al. A Feature Selection and Evaluation Scheme for Computer Virus Detection , 2006, Sixth International Conference on Data Mining (ICDM'06).
[2] KoufakouAnna,et al. A fast outlier detection strategy for distributed high-dimensional data sets with mixed attributes , 2010 .
[3] Michael Georgiopoulos,et al. A fast outlier detection strategy for distributed high-dimensional data sets with mixed attributes , 2010, Data Mining and Knowledge Discovery.
[4] Wonil Kim,et al. Artificial Immune System against Viral Attack , 2004, International Conference on Computational Science.
[5] Stephanie Forrest,et al. Coverage and Generalization in an Artificial Immune System , 2002, GECCO.
[6] Gerry V. Dozier,et al. An evaluation of negative selection algorithm with constraint-based detectors , 2006, ACM-SE 44.
[7] Liu Xing-bao. Application of Evolutionary Strategy to Negative Selection Algorithm , 2008 .
[8] Alan S. Perelson,et al. Self-nonself discrimination in a computer , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.
[9] Jing Xu,et al. A New Distributed Intrusion Detection Method Based on Immune Mobile Agent , 2010, 2018 Sixth International Conference on Advanced Cloud and Big Data (CBD).
[10] Zhang Peng. A Feature Extraction Method of Computer Viruses Based on Artificial Immune and Code Relevance , 2011 .
[11] Tao Li,et al. A novel intrusion detection approach learned from the change of antibody concentration in biological immune response , 2011, Applied Intelligence.
[12] Stephanie Forrest,et al. Infect Recognize Destroy , 1996 .
[13] Julie Greensmith,et al. Dendritic Cells for Anomaly Detection , 2006, 2006 IEEE International Conference on Evolutionary Computation.
[14] P. Deepak,et al. Spam filtering using spam mail communities , 2005, The 2005 Symposium on Applications and the Internet.
[15] L. Segel,et al. Design Principles for the Immune System and Other Distributed Autonomous Systems , 2001 .
[16] Chung-Ming Ou,et al. Host-based intrusion detection systems adapted from agent-based artificial immune systems , 2012, Neurocomputing.
[17] Zhang-Zan Jin,et al. Survey of negative selection algorithms , 2013 .
[18] Zhang Fu-zhi. Improved feature selection algorithm in spam filtering based on TF*IDF , 2009 .