000 | 02205cam a2200361 i 4500 | ||
---|---|---|---|
020 | _a9781119076278 (Adobe PDF) | ||
020 | _a1119076277 (Adobe PDF) | ||
020 | _a9781119076520 (ePub) | ||
020 | _a1119076528 (ePub) | ||
020 | _z9781119076285 (hardback) | ||
020 | _a9781119076582 | ||
020 | _a1119076587 | ||
020 | _z1119076285 | ||
024 | 7 |
_a10.1002/9781119076582 _2doi |
|
040 | _cCUS | ||
072 | 7 |
_aCOM _x043050 _2bisacsh |
|
084 |
_aCOM083000 _2bisacsh |
||
100 | 1 |
_aTan, Ying, _d1964- _eauthor. |
|
245 | 1 | 0 |
_aArtificial immune system : _bapplications in computer security / _cYing Tan. |
260 | 1 |
_aHoboken : _bJohn Wiley & Sons Inc., _c2016. |
|
300 | _a1 online resource. | ||
500 | _aIncludes index. | ||
520 |
_a"This book focuses on the technologies and applications of artificial immune systems in malware and spam detection proposed in recent years by the computation intelligence laboratory at Peking University, China. It offers a theoretical perspective and practical solutions to graduate students, practitioners, and researchers working in the area of artificial immune system, machine learning, pattern recognition, and computer security"-- _cProvided by publisher. |
||
505 | 0 | _aArtificial Immune System -- Malware Detection -- Immune Principle and Neural Networks-Based Malware Detection -- Multiple-Point Bit Mutation Method of Detector Generation -- Malware Detection System Using Affinity Vectors -- Hierarchical Artificial Immune Model -- Negative Selection Algorithm with Penalty Factor -- Danger Feature-Based Negative Selection Algorithm -- Immune Concentration-Based Malware Detection Approaches -- Immune Cooperation Mechanism-Based Learning Framework -- Class-Wise Information Gai. | |
650 | 0 | _aArtificial immune systems. | |
650 | 0 | _aComputer security. | |
650 | 0 |
_aComputer networks _xSecurity measures. |
|
650 | 7 |
_aCOMPUTERS / Security / Cryptography. _2bisacsh |
|
650 | 7 |
_aArtificial immune systems. _2fast _0(OCoLC)fst00967933 |
|
650 | 7 |
_aComputer networks _xSecurity measures. _2fast _0(OCoLC)fst00872341 |
|
650 | 7 |
_aComputer security. _2fast _0(OCoLC)fst00872484 |
|
856 | 4 | 0 |
_uhttps://doi.org/10.1002/9781119076582 _zWiley Online Library |
942 | _cEBK | ||
999 |
_c208663 _d208663 |