Author of the publication

Artificial Immunity-Based Discovery for Popular Information in WEB Pages.

, , , , , and . International Conference on Computational Science (4), volume 4490 of Lecture Notes in Computer Science, page 166-169. Springer, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Novel Deep Transfer Learning Method for Intelligent Fault Diagnosis Based on Variational Mode Decomposition and Efficient Channel Attention., , , , , and . Entropy, 24 (8): 1087 (2022)Real-Valued Negative Selection Algorithm with Variable-Sized Self Radius., , , , and . ICICA (LNCS), volume 7473 of Lecture Notes in Computer Science, page 229-235. Springer, (2012)A Supervised Classifier Based on Artificial Immune System., , , , , , and . International Conference on Computational Science (2), volume 4488 of Lecture Notes in Computer Science, page 355-362. Springer, (2007)A Computer Forensics Model Based On Danger Theory., , , , , and . IITA, page 87-90. IEEE Computer Society, (2007)A Novel Approach to IoT Security Based on Immunology., , and . CIS, page 771-775. IEEE Computer Society, (2013)Dynamical Network Forensics Based on Immune Agent., , , , and . ICNC (3), page 651-656. IEEE Computer Society, (2007)Research on immunity-based intrusion detection technology for the Internet of Things., , , , and . ICNC, page 212-216. IEEE, (2011)Cloud Computing for Network Security Intrusion Detection System., , , and . J. Networks, 8 (1): 140-147 (2013)Full Coverage Detection of Immune Detector for Public Data Set., , , and . CIS, page 308-312. IEEE, (2020)An Intrusion Detection Model Combining Signature-Based Recognition and Two-Round Immune-Based Recognition., and . CIS, page 497-501. IEEE, (2021)