Login / Signup
Intrusion Detection Techniques Based on Cutting-Based Real-Valued Negative Selection.
Yang Lei
Xu An Wang
Hongyan Yin
Published in:
INCoS (2016)
Keyphrases
</>
negative selection
intrusion detection
real valued
artificial immune
intrusion detection system
anomaly detection
network intrusion detection
network traffic
data mining
data mining techniques
latent variables
fraud detection
information retrieval
artificial neural networks
evolutionary algorithm