000 02205cam a2200361 i 4500
020 _a9781119076278 (Adobe PDF)
020 _a1119076277 (Adobe PDF)
020 _a9781119076520 (ePub)
020 _a1119076528 (ePub)
020 _z9781119076285 (hardback)
020 _a9781119076582
020 _a1119076587
020 _z1119076285
024 7 _a10.1002/9781119076582
_2doi
040 _cCUS
072 7 _aCOM
_x043050
_2bisacsh
084 _aCOM083000
_2bisacsh
100 1 _aTan, Ying,
_d1964-
_eauthor.
245 1 0 _aArtificial immune system :
_bapplications in computer security /
_cYing Tan.
260 1 _aHoboken :
_bJohn Wiley & Sons Inc.,
_c2016.
300 _a1 online resource.
500 _aIncludes index.
520 _a"This book focuses on the technologies and applications of artificial immune systems in malware and spam detection proposed in recent years by the computation intelligence laboratory at Peking University, China. It offers a theoretical perspective and practical solutions to graduate students, practitioners, and researchers working in the area of artificial immune system, machine learning, pattern recognition, and computer security"--
_cProvided by publisher.
505 0 _aArtificial Immune System -- Malware Detection -- Immune Principle and Neural Networks-Based Malware Detection -- Multiple-Point Bit Mutation Method of Detector Generation -- Malware Detection System Using Affinity Vectors -- Hierarchical Artificial Immune Model -- Negative Selection Algorithm with Penalty Factor -- Danger Feature-Based Negative Selection Algorithm -- Immune Concentration-Based Malware Detection Approaches -- Immune Cooperation Mechanism-Based Learning Framework -- Class-Wise Information Gai.
650 0 _aArtificial immune systems.
650 0 _aComputer security.
650 0 _aComputer networks
_xSecurity measures.
650 7 _aCOMPUTERS / Security / Cryptography.
_2bisacsh
650 7 _aArtificial immune systems.
_2fast
_0(OCoLC)fst00967933
650 7 _aComputer networks
_xSecurity measures.
_2fast
_0(OCoLC)fst00872341
650 7 _aComputer security.
_2fast
_0(OCoLC)fst00872484
856 4 0 _uhttps://doi.org/10.1002/9781119076582
_zWiley Online Library
942 _cEBK
999 _c208663
_d208663