参考文献
[1]Boukerche A,Machado R B,Juca R L.An Agent Based and Biological Inspired Real-time Intrusion Detection and Security Model for Computer Network Opera-tions[J].Computer Communications,2007,30(13):2649-2660.
[2]Dal D,Abraham S,Abraham A,et al.Evolutionary Induced Secondary Immunity:An Artificial Immune Systems Based Intrusion Detection Systems[C]//Proceedings of the 7th International Conference on Computer Information Systems and
Industrial Management Applications.Ostrava,Czech Republic:[s.n.],2008:65-70.
[3]Forrest S,Perelson S,Allen L.Self-nonself Discrimina-tion in a Computer[C]//Proceedings of IEEE Society Symposium on Research in Security and Privacy and Privacy.Washington D.C.,USA:IEEE Press,1994:202-212.
[4]Wang X.Research of Immune Intrusion Detection Algorithm Based on Semi-supervised Clustering[C]//Proceedings of the 3rd International Conference on Artificial Intelligence and Computational
Intelligence.Berlin,Germany:Springer,2011:69-74.
[5]Mostardinha P,Faria B F,Zúquete A,et al.A Negative Selection Approach to intrusion Detection[C]//Proceedings of the 11th International Conference on Artificial Immune Systems.Berlin,Germany:Springer,2012:178-190.
[6]Wang Huadong,Zhong Jiang,Li Ang.Network Intrusion Detection Based on Artificial Immune Clustering[J].Journal of Information and Computational Science,2013,10(10):3003-3012.
[7]Mahapatra P K,Kaur M,Sethi S,et al.Improved Thresholding Based on Negative Selection Algori-thm[J].Evolutionary Intelligence,2014,6(3):157-170.
[8]周宣武,杨晓元,潘晓中,等.基于遗传算法的免疫入侵检测分析引擎[J].计算机工程,2008,34(3):191-193.
[9]张玲,白中英,罗守山,等.基于粗糙集和人工免疫的集成入侵检测模型[J].通信学报,2013,34(9):166-176.
[10]Xi Liang,Zhang Fengbin,Wang Dawei.Optimization of Real-valued Self Set for Anomaly Detection Using Gaussian Distribution[C]//Proceedings of the 1ft International Conference on Artificial Intelligence and Computational
Intelligence.Berlin,Germany:Springer, 2009:112-120.
[11]刘海龙,张凤斌,席亮.免疫入侵检测高维实值检测器分布优化算法[J].清华大学学报:自然科学版,2013,52(10):1415-1419.
[12]刘海龙,张凤斌,席亮.基于协同进化的免疫检测器分布优化算法[J].计算机工程,2013,39(11):154-157.
[13]张凤斌,席亮,王大伟.邻域空间与检测算法[J].控制与决策,2011,26(10):1562-1566.
[14]Zhang Fengbin,Wang Dawei,Wang Shengwen.A Negative Selection Algorithm with Neighborhood Re-presentation[J].Journal of Harbin Institute of Tech-nology,2011,18(3):74-78.
[15]何自芬,詹肇麟,张印辉.基于K-means聚类的数字半色调算法[J].计算机应用研究,2013,30(1):307-309.
[16]Wang Dawei,Xue Yibo,Yingfei D.Anomaly Detection Using Neighborhood Negative Selection[J].Intelligent Automation & Soft Computing,2011,17(5):595-605.
[17]Wang Dawei,Xue Yibo.Novel Neighborhood Negative Selection Algorithm[C]//Proceedings of Conference on Dependable Computing.Washington D.C.,USA:IEEE Press,2010:453-457.
编辑顾逸斐 |