Computer Science ›› 2015, Vol. 42 ›› Issue (8): 170-174.
Previous Articles Next Articles
YANG Chao and LI Tao
[1] Aickelin U,Cayzer S.The Danger Theory and Its Application to Artificial Immune Systems [C]∥Proceedings of the 1st International Conference on Artificial Immune Systems(ICARIS-2002).Canterbury,UK,2002:141-148 [2] Vella M,Roper M,Terzis S.Danger Theory and Intrusion Detection:Possibilities and Limitations of the Analogy[C]∥Proceedings of the International Conference on Artificial Immune Systems(ICARIS-2010).2010:276-289 [3] Greensmith J,Aickelin U.Dendritic Cells for SYN Scan Detection[C]∥Proceedings of 9th Annual Conference on Genetic and Evolutionary Computation.2007:49-56 [4] Zhu Y,Tan Y.A Danger Theory Inspired Learning Model and Its Application to Spam Detection[C]∥Advances in Swarm Intelligence:Proceedings of 2nd International Conference on ICSI 2011.Springer,2011:382-389 [5] Musselle C.Rethinking Concepts of the Dendritic Cell Algo-rithm for Multiple Data Stream Analysis[C]∥Proceedings of the 11st International Conference on Artificial Immune Systems(ICARIS-2012).Berlin Heidelberg,2012:246-259 [6] Gu F,Greensmith J,Aickelin U.The Dendritic Cell Algorithm for Intrusion Detection [M]∥Biologically Inspired Networking and Sensing:Algorithms and Architectures.2012 [7] Vella M,Roper M,Terzis S.Danger Theory and Intrusion Detection:Possibilities and Limitations[C]∥Proceedings of 9th International Conference on Artificial Immune Systems(ICARIS 2010).2010:276-289 [8] Bianchi M E.DAMPs,PAMPs and alarmins:all we need toknow about danger [J].Journal of Leukocyte Biology,2007,81(1):1-5 [9] Greensmith J,Aickelin U.Dendritic Cells for SYN Scan Detection [C]∥Proceedings of 9th Annual Conference on Genetic and Evolutionary Computation.2007:49-56 [10] Greensmith J,Aickelin U,Twycross.Articulation and Clarification of the Dendritic Cell Algorithm [C]∥Artifical Immune Systems:Proceedings of the 5th International Conference on Artificial Immune Systems(ICARIS).Springer,2006:404-417 [11] Oates R,Greensmith J,Aickelin U,et al.The Application of a Dendritic Cell Algorithm to a Robotic Classifier [C]∥Artificial Immune Systems:Proceedings of 6th International Conference on ICARIS 2007.Springer,2007:204-215 [12] Al-Hammadi Y,Aickelin U,Greensmith J.DCA for bot detection [C]∥Evolutionary Computation(CEC 2008).2008:1807-1816 [13] Vella M,Roper M.Characterization of a danger context for detecting novel attacks targeting Web-based systems [EB/OL].http://www.cis.strath.ac.uk/~mv/trep2.pdf.2010 [14] 陈慰峰.医学免疫学[M].北京:人民卫生出版社,2000 Chen Wei-feng.Medical Immunology [M].Beijing:People’s Medical Publishing House Press,2000 [15] Li Y,Chen J,Gong P,et al.Study on Land Cover Change Detection Method Based on NDVI Time Series Datasets Change Detection Indexes Design [J].Journal of Basic Science and Engineering, 2005,13(3):261-275 [16] Yang Chao,Liang Yi-wen,Liu Ao-lin.The Danger Sensed Methodby Feature Changes [J].Energy Procedia 13,2011:4429-4437 |
No related articles found! |
|