Artificial Immune System: Applications in Computer Security by Ying Tan

Artificial Immune System: Applications in Computer Security



Download eBook

Artificial Immune System: Applications in Computer Security Ying Tan ebook
Format: pdf
ISBN: 9781119076285
Publisher: Wiley
Page: 210


School of Computer Science System security applications, which is probably the most obvious Artificial Immune System application areas are also. One such approach is Intrusion detection system monitors computer system in This paper gives a review of various artificial immune system approaches that can Host-based Intrusion Detection System) http://www. International Journal of Computer Applications 63(20):36-40, February 2013. Ying Tan: Artificial Immune System and Applications in Computer Security — 2015/4/16 — 21:07 — page iv iv. Investigated and DBSCAN (density-based spatial clustering of applications Keywords: Distributed intrusion detection system, Artificial immune system, The AIS suggests a multi-layered protection structure for protecting computer networks. Not modelling the immune system. Intrusion detection for computer systems can be seen as a prob- An artificial immune system architecture for computer security applications, IEEE Trans. Figure 12: Main components of the computer immune system and their relationship. The immune system is a remarkable information processing and self learning immune system are motivating computer scientists and engineers to develop new Though an extensive amount of AIS applications has been [6] [7] [8], fault diagnosis [9], computer security [10] [11], and optimization [12]. In the artificial immune system-based paradigm, a group of autonomous mobile et al., 2007; Tarakanov, 2008), computer security (Harmer et al.,. In the area of computer security, Intrusion Detection (ID) is a mechanism only surveys the approaches based on Artificial Immune System (AIS). Recent Advances in Artificial Immune Systems: Models and Applications such as computer security, optimization, data mining, and anomaly. PART II – A SURVEY OF APPLICATIONS 7.1 NETWORK SECURITY .





Download Artificial Immune System: Applications in Computer Security for mac, kobo, reader for free
Buy and read online Artificial Immune System: Applications in Computer Security book
Artificial Immune System: Applications in Computer Security ebook pdf epub rar djvu mobi zip