An Immune Concentration Based Virus Detection Approach Using Particle Swarm Optimization
暂无分享,去创建一个
Ying Tan | Wei Wang | Pengtao Zhang | Ying Tan | Wei Wang | Pengtao Zhang
[1] Yuval Elovici,et al. Unknown malcode detection via text categorization and the imbalance problem , 2008, 2008 IEEE International Conference on Intelligence and Security Informatics.
[2] Ying Tan,et al. A three-layer back-propagation neural network for spam detection using artificial immune concentration , 2009, Soft Comput..
[3] Lilly Suriani Affendey,et al. Intrusion detection using data mining techniques , 2010, 2010 International Conference on Information Retrieval & Knowledge Management (CAMP).
[4] Jau-Hwang Wang,et al. Virus detection using data mining techinques , 2003, IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings..
[5] Somesh Jha,et al. A semantics-based approach to malware detection , 2008, TOPL.
[6] Y. Tan,et al. Clonal particle swarm optimization and its applications , 2007, 2007 IEEE Congress on Evolutionary Computation.
[7] Jau-Hwang Wang,et al. Intelligent automatic malicious code signatures extraction , 2003, IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings..
[8] Harris Drucker,et al. Support vector machines for spam categorization , 1999, IEEE Trans. Neural Networks.
[9] Ying Tan,et al. A Virus Detection System Based on Artificial Immune System , 2009, 2009 International Conference on Computational Intelligence and Security.
[10] Ying Tan,et al. A Hierarchical Artificial Immune Model for Virus Detection , 2009, 2009 International Conference on Computational Intelligence and Security.
[11] Jeffrey O. Kephart,et al. A biologically inspired immune system for computers , 1994 .
[12] Salvatore J. Stolfo,et al. Data mining methods for detection of new malicious executables , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[13] Ying Tan,et al. Concentration based feature construction approach for spam detection , 2009, 2009 International Joint Conference on Neural Networks.
[14] Nathalie Japkowicz,et al. A Feature Selection and Evaluation Scheme for Computer Virus Detection , 2006, Sixth International Conference on Data Mining (ICDM'06).
[15] Stephanie Forrest,et al. Intrusion Detection Using Sequences of System Calls , 1998, J. Comput. Secur..