[PDF][PDF] Theoretical and empirical extensions of the dendritic cell algorithm

F Gu - 2011 - researchgate.net
Abstract The area of Artificial Immune Systems (AIS) that bridges immunology, computer
science, engineering and mathematics, has gained great interests in the last decade. One of …

[引用][C] 树突状细胞算法原理及其应用

陈岳兵, 冯超, 张权, 唐朝京 - 计算机工程, 2010

[引用][C] 僵尸网络检测技术研究进展

王海龙, 龚正虎, 侯婕 - 计算机研究与发展, 2010

Detecting software keyloggers with dendritic cell algorithm

J Fu, Y Liang, C Tan, X Xiong - 2010 International Conference …, 2010 - ieeexplore.ieee.org
As a kind of invisible spyware that records user's keystrokes, software keyloggers have
posed a great threat to user privacy and security. It is difficult to detect keyloggers because …

Biologically inspired anomaly detection and security control frameworks for complex heterogeneous networks

F Hashim, KS Munasinghe… - IEEE Transactions on …, 2010 - ieeexplore.ieee.org
The demand for anytime, anywhere, anyhow communications in future generation networks
necessitates a paradigm shift from independent network services into a more harmonized …

A sense of 'danger'for windows processes

S Manzoor, MZ Shafiq, SM Tabish, M Farooq - Artificial Immune Systems …, 2009 - Springer
The sophistication of modern computer malware demands run-time malware detection
strategies which are not only efficient but also robust to obfuscation and evasion attempts. In …

Website navigation behavior analysis for bot detection

R Haidar, S Elbassuoni - 2017 IEEE International Conference …, 2017 - ieeexplore.ieee.org
Detecting bots is an important goal for most website admins. In this paper, we propose a
novel machine learning bot detection approach based on local website navigation behavior …

Outbreak detection model based on danger theory

MFM Mohsin, AA Bakar, AR Hamdan - Applied soft computing, 2014 - Elsevier
In outbreak detection, one of the key issues is the need to deal with the weakness of early
outbreak signals because this causes the detection model to have has less capability in …

A revised dendritic cell algorithm using k-means clustering

N Elisa, L Yang, Y Qu, F Chao - 2018 IEEE 20th International …, 2018 - ieeexplore.ieee.org
The most daunting and challenging task in intrusion detection is to distinguishing between
normal and malicious traffics effectively. In order to complete such a task, the biological …

[PDF][PDF] Botnet detection based on correlation of malicious behaviors

C Yin, M Zou, D Iko, J Wang - International Journal of Hybrid Information …, 2013 - Citeseer
Botnet has become the most serious security threats on the current Internet infrastructure.
Botnet is a group of compromised computers (Bots) which are remotely controlled by its …