Computer Science ›› 2013, Vol. 40 ›› Issue (12): 233-238.
Previous Articles Next Articles
LI Gui-yang and GUO Tao
[1] Dasgupta D.Advances in artificial immune systems[J].IEEE Computational Intelligence Magazine,2006,1(4):40-49 [2] Forrest S,Beauchemin C.Computer immunology[J].Immunol Rev,2007,216(1):176-197 [3] Timmis J,et al.Theoretical advances in artificial immune sys-tems[J].Theoretical Computer Science,2008,403(1):11-32 [4] Hofmeyr S,Forrest S.Immunity by Design:An Artificial Immune System[C]∥Proceedings of the Genetic and Evolutionary Computation Conference (GECCO 1999).1999:1289-1296 [5] Hofmeyr S,Forrest S.Architecture for an artificial immune system[J].Evolutionary Computation,2000,8(4):443-473 [6] 李涛.计算机免疫学[M].北京:电子工业出版社,2004:147-159 [7] Dasgupta D.Immunity-based intrusion detection system:A ge-neral framework[C]∥The 22nd National Information Systems Security Conf.1999:147-160 [8] Harmer P K,et al.An artificial immune system architecture forcomputer security applications[J].IEEE Transaction on Evolutionary Computation,2002,6(3):252-280 [9] Kim J,Bentley P.Towards an artificial immune system for network intrusion detection:An investigation of dynamic clonal selection[C]∥Congress on Evolutionary Computation (CEC 2002).2002:1015-1020 [10] Kim J,Bentley P.Immune memory and gene library evolution in the dynamic clonal selection algorithm[J].Genetic Programming and Evolvable Machines,2004,5(4):361-391 [11] Kim J,et al.Immune system approaches to intrusion detection-a review[J].Natural computing,2007,6(4):413-466 [12] 李涛.基于免疫的计算机病毒动态检测模型[J].中国科学F辑:信息科学,2009,39(4):422-430 [13] Kim J,Bentley P.An evaluation of negative selection in an artificial immune system for network intrusion detection[C]∥Proceedings of Genetic and Evolutionary Computation Conference (GECCO 2001).2001:1330-1337 [14] Timmis J.Artificial immune systems—today and tomorrow[J].Natural Computing,2007,6(1):1-18 [15] Li Gui-yang,et al.An Outlier Robust Negative Selection Algo-rithm Inspired by Immune Suppression[J].Journal of Compu-ters,2010,5(9):1348-1355 [16] 李贵洋,郭涛.一种基于受体编辑的实值阴性选择算法[J].计算机科学,2012,39(8):246-251 [17] 罗微,马骊,王小宁.T细胞受体编辑与修正[J].中华微生物学和免疫学杂志,2008,28(003):278-281 [18] Stibor T,et al.A comparative study of real-valued negative selection to statistical anomaly detection techniques[C]∥Procee-dings of Second International Conference on Artificial Immune System (ICARIS 2005).2005:262-272 |
No related articles found! |
|