Author:
Bonyah Ebenezer,Atangana Abdon,Khan Muhammad Altaf
Publisher
Springer Science and Business Media LLC
Reference24 articles.
1. Denning PJ (1990) Computers under attack. Addison-Wesley, New York. http://www.washtech.com/news/netarch/12267-1.html
2. Forrest S, Hofmayer SA, Somayaj A (1997) Computer immunology. Commun ACM 40(10):88–96
3. Kephart JO, Hogg T, Huberman BA (1989) Dynamics of computational ecosystems. Phys Rev A 40(1):404–421
4. Kephart JO, White SR, Chess DM (1993) Computers and epidemiology. IEEE Spectr 30(5):20–26
5. Kephart JO, Sorkin GB, Swimmer M (1997) An immune system for cyberspace. In: Proceedings of the IEEE international conference on systems, men, and cybernetics. IEEE, Orlando, p 879–884
Cited by
32 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献