Login / Signup
The application of immune clone algorithm in network intrusion detection.
Xuekun Zhang
Jing An
Yongbin Wang
Wen Liu
Published in:
ICIS (2017)
Keyphrases
</>
network intrusion detection
learning algorithm
detection algorithm
social networks
similarity measure
probabilistic model
computational intelligence
anomaly detection
decision trees
k means
knn