Sign in

The application of immune clone algorithm in network intrusion detection.

Xuekun ZhangJing AnYongbin WangWen Liu
Published in: ICIS (2017)
Keyphrases
  • network intrusion detection
  • learning algorithm
  • detection algorithm
  • social networks
  • similarity measure
  • probabilistic model
  • computational intelligence
  • anomaly detection
  • decision trees
  • k means
  • knn