• Reference Citation Analysis
  • v
  • v
  • Find an Article
Find an Article PDF (4636010)   Today's Articles (293)   Subscriber (50080)
For: Kim J, Wilson WO, Aickelin U, McLeod J. Cooperative Automated Worm Response and Detection ImmuNe ALgorithm(CARDINAL) Inspired by T-Cell Immunity and Tolerance. ACTA ACUST UNITED AC 2005. [DOI: 10.1007/11536444_13] [Citation(s) in RCA: 4] [Impact Index Per Article: 0.2] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 02/16/2023]
Number Cited by Other Article(s)
1
Genetic optimized artificial immune system in spam detection: a review and a model. Artif Intell Rev 2011. [DOI: 10.1007/s10462-011-9285-z] [Citation(s) in RCA: 7] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/15/2022]
2
Hashim F, Munasinghe KS, Jamalipour A. Biologically Inspired Anomaly Detection and Security Control Frameworks for Complex Heterogeneous Networks. IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT 2010. [DOI: 10.1109/tnsm.2010.1012.0360] [Citation(s) in RCA: 16] [Impact Index Per Article: 1.1] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 01/09/2023]
3
A Survey of artificial immune applications. Artif Intell Rev 2010. [DOI: 10.1007/s10462-010-9159-9] [Citation(s) in RCA: 26] [Impact Index Per Article: 1.9] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/19/2022]
4
Detecting interest cache poisoning in sensor networks using an artificial immune algorithm. APPL INTELL 2008. [DOI: 10.1007/s10489-008-0132-0] [Citation(s) in RCA: 22] [Impact Index Per Article: 1.4] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/27/2022]
5
Shen X, Gao XZ, Bie R. Artificial Immune Networks: Models and Applications. INT J COMPUT INT SYS 2008. [DOI: 10.1080/18756891.2008.9727614] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/26/2022]  Open
6
Danger Is Ubiquitous: Detecting Malicious Activities in Sensor Networks Using the Dendritic Cell Algorithm. LECTURE NOTES IN COMPUTER SCIENCE 2006. [DOI: 10.1007/11823940_30] [Citation(s) in RCA: 33] [Impact Index Per Article: 1.8] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 01/15/2023]
PrevPage 1 of 1 1Next
© 2004-2024 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA