An artificial immune system architecture for computer security applications.
Paul K. HarmerPaul D. WilliamsGregg H. GunschGary B. LamontPublished in: IEEE Trans. Evol. Comput. (2002)
Keyphrases
- computer security
- information security
- intrusion detection
- anomaly detection
- computer systems
- management system
- real time
- intrusion detection system
- software architecture
- network security
- network intrusion detection
- case study
- computer vision
- feature selection
- pattern recognition
- software engineering
- computer networks
- artificial immune system
- information retrieval