Author:
Belhadj-Aissa Naila,Guerroumi Mohamed
Publisher
Springer International Publishing
Reference19 articles.
1. Bhuyan, M., Bhattacharyya, D., Kalita, J.: Network anomaly detection: methods, systems and tools. IEEE Commun. Surv. Tutorials 16(1), 1–34 (2014)
2. Liao, H.J., Lin, C.H.R., Lin, Y.C., Tung, K.Y.: Intrusion detection system: a comprehensive review. J. Netw. Comput. Appl. 36(1), 16–24 (2013)
3. Al-Enezi, J., Abbod, M., Alsharhan, S.: Artificial Immune Systems-models, algorithms and applications (2010)
4. Forrest, S., Perelson, A.S., Allen, L., Cherukuri, R.: Self-nonself discrimination in a computer. In: IEEE Symposium on Security and Privacy, pp. 202–212 (1994)
5. Hofmeyr, S.A., Forrest, S.: Architecture for an artificial immune system. Evol. Comput. 8(4), 443–473 (2000)
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献