Study of Immune Control Computing in Immune Detection Algorithm for Information Security.
Ya Jing ZhangYang XuePublished in: ICIC (2) (2008)
Keyphrases
- detection algorithm
- information security
- detection rate
- motion detection
- detection accuracy
- detection method
- countermeasures
- information security management
- shot boundary detection
- intrusion detection
- anomaly detection
- fall detection
- face detection
- knowledge management
- semi supervised
- control system
- association rules
- security issues
- smart grid
- corner detection
- object recognition
- machine learning