Author:
Lyngdoh Juniorika,Hussain Md. Iftekhar,Majaw Suktilang,Kalita Hemanta Kumar
Reference18 articles.
1. EshghiShargh, A.: Using artificial immune system on implementation of intrusion detection systems. In: Third UKSim European Symposium on Computer Modeling and Simulation, pp. 164–168 (2009)
2. Mazurczyk, W., Rzeszutko, E.: Security -a perpetual war: lessons from nature. IT Professional, vol. 17, pp. 16–22 (2015)
3. Kermanshahi, S.K., Salleh, M.: Towards the security issues in mobile ad hoc networks. Int. J. Innov. Res. Inf. Secur. (IJIRIS) 2, 22–27 (2015)
4. Abdelhadi, A., Mous, L.M.: The use of artificial immune system algorithms in monitoring industrial. In: 6th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications, SETIT. IEEE, pp. 50–55 (2012)
5. Alberts, B., Johnson, A., Lewis, J., Raff, M.: Immunobiology: The Immune System in Health and Disease, 5th edn (2008). ISBN 978-0815341055
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献