Author:
Yang Jin,Liu XiaoJie,Li Tao,Liang Gang,Liu SunJun
Subject
Artificial Intelligence,Information Systems and Management,Management Information Systems,Software
Reference16 articles.
1. Network management information models;Pilz;AEU-International Journal of Electronics and Communications,2004
2. A quantitative model of the security intrusion process based on attacker behavior;Jonsson;IEEE Transactions on Software Engineering,1997
3. The construction of a boolean competitive neural networks using ideas from immunology;De Castro;Neurocomputing,2003
4. F.M. Burnet, The Clone Selection Theory of Acquired Immunity, Cambridge University Press, (1959), 76–132.
5. S. Forrest, A.S. Perelson, L. Allen, Self-nonself discrimination in a computer, in: Proceedings of IEEE Symposium on Research in Security and Privacy, Oakland, (1994) 202–212.
Cited by
31 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献