Survey of network-based defense mechanisms countering the DoS and DDoS problems

T Peng, C Leckie, K Ramamohanarao - ACM Computing Surveys (CSUR …, 2007 - dl.acm.org
This article presents a survey of denial of service attacks and the methods that have been
proposed for defense against these attacks. In this survey, we analyze the design decisions …

Recent advances in particle swarm

X Hu, Y Shi, R Eberhart - Proceedings of the 2004 congress on …, 2004 - ieeexplore.ieee.org
Recent advances in particle swarm Page 1 Recent Advances in Particle Swarm Xiaohui Hu
Yuhui Shi Russ Eberhart Department of Biomedical Engineering EDS Embeded Systems …

How Artificial Intelligence and machine learning research impacts payment card fraud detection: A survey and industry benchmark

NF Ryman-Tubb, P Krause, W Garn - Engineering Applications of Artificial …, 2018 - Elsevier
The core goal of this paper is to identify guidance on how the research community can better
transition their research into payment card fraud detection towards a transformation away …

Artificial immune recognition system (AIRS): An immune-inspired supervised learning algorithm

A Watkins, J Timmis, L Boggess - Genetic Programming and Evolvable …, 2004 - Springer
This paper presents the inception and subsequent revisions of an immune-inspired
supervised learning algorithm, Artificial Immune Recognition System (AIRS). It presents the …

[图书][B] Immunological computation: theory and applications

D Dasgupta, F Nino - 2008 - taylorfrancis.com
Clearly, nature has been very effective in creating organisms that are capable of protecting
themselves against a wide variety of pathogens such as bacteria, fungi, and parasites. The …

An overview of artificial immune systems

J Timmis, T Knight, LN de Castro, E Hart - Computation in cells and …, 2004 - Springer
The immune system is highly distributed, highly adaptive, self-organising in nature,
maintains a memory of past encounters and has the ability to continually learn about new …

Exploring the behavior of malware propagation on mobile wireless sensor networks: Stability and control analysis

S Kumari, RK Upadhyay - Mathematics and Computers in Simulation, 2021 - Elsevier
This paper aims to explore the behavior of malware propagation on mobile wireless sensor
networks (MWSNs). A new malware propagation model with nonlinear incidence rate and …

Artificial immune systems for the detection of credit card fraud: an architecture, prototype and preliminary results

N Wong, P Ray, G Stephens… - Information Systems …, 2012 - Wiley Online Library
Some biological phenomena offer clues to solving real‐life, complex problems. Researchers
have been studying techniques such as neural networks and genetic algorithms for …

Nate: N etwork analysis of a nomalous t raffic e vents, a low-cost approach

C Taylor, J Alves-Foss - Proceedings of the 2001 workshop on New …, 2001 - dl.acm.org
A new approach to network intrusion detection is needed to solve the monitoring problems
of high volume network data and the time constraints for Intrusion Detection System (IDS) …

Управление проектами, программами

ЮН Арсеньев, ТЮ Давыдова - 2021 - elibrary.ru
Учебник посвящен анализу основных аспектов управления проектами и программами,
включающих определение концепций, методологии, принципов, задач, функций …