Loading…
Login
Scholar Register
Business Register
Subscribe
Loading…
Article Title
Abstract
Keyword
Category
MESH Heading
Grant Agency
RCAID
DOI
PMID
PMCID
Author
Affiliation
Email
Journal Title
ISSN
Publisher
Loading…
Contains
Equals
Find an Article
Find an Article (55640860)
Find a Category (125)
Find a Journal (6166)
Find a Scholar (4203)
Find an Academic Assistant (18)
Find an Article PDF (4636010)
Today's Articles (293)
Subscriber (50080)
Citation(s) in
RCA
6
(from Reference Citation Analysis)
Indexed Articles
Today (0)
Yesterday (0)
This Week (0)
Last Week (0)
Current Month (0)
Last Month (0)
Ranked By
Impact Index Per Article
Citation(s) in
RCA
Results Analysis
Year Published Analysis
Article Type Analysis
Journal Title Analysis
Category Analysis
Results Analysis
Year Published
2011 (1)
2010 (2)
2008 (2)
2006 (1)
Show more
Refine
Article Statistics
RCA (5)
SCIE (5)
Open (1)
Refine
Publication Titles
ARTIFICIAL INTELLIGENCE REVIEW (2)
APPLIED INTELLIGENCE (1)
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT (1)
INTERNATIONAL JOURNAL OF COMPUTATIONAL INTELLIGENCE SYSTEMS (1)
LECTURE NOTES IN COMPUTER SCIENCE (1)
Show more
Refine
Category
Computer Science, Artificial Intelligence (4)
Computer Science, Information Systems (1)
Computer Science, Interdisciplinary Applications (1)
Multidisciplinary Sciences (1)
Show more
Refine
For:
Kim J
, Wilson WO, Aickelin U, McLeod J.
Cooperative Automated Worm Response and Detection ImmuNe ALgorithm(CARDINAL) Inspired by T-Cell Immunity and Tolerance.
ACTA ACUST UNITED AC
2005. [DOI:
10.1007/11536444_13
]
[
Citation(s) in
RCA
: 4
]
[
Impact Index Per Article: 0.2
]
[
Reference Citation Analysis
]
[
What about the content of this article? (
0
)
]
[
Track Full Text
]
[
Journal Information
]
[
Subscribe
]
[
Scholar Register
]
[Indexed: 02/16/2023]
Number
Cited by Other Article(s)
1
Genetic optimized artificial immune system in spam detection: a review and a model.
Artif Intell Rev
2011. [DOI:
10.1007/s10462-011-9285-z
]
[
Citation(s) in
RCA
: 7
]
[
Impact Index Per Article: 0.5
]
[
Reference Citation Analysis
]
[
Track Full Text
]
[
Journal Information
]
[
Subscribe
]
[
Scholar Register
]
[Indexed: 10/15/2022]
Abstract
Collapse
Key Words
Collapse
MESH Headings
Collapse
Grants
Collapse
Affiliation(s)
Collapse
2
Hashim F
, Munasinghe KS, Jamalipour A. Biologically Inspired Anomaly Detection and Security Control Frameworks for Complex Heterogeneous Networks.
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT
2010. [DOI:
10.1109/tnsm.2010.1012.0360
]
[
Citation(s) in
RCA
: 16
]
[
Impact Index Per Article: 1.1
]
[
Reference Citation Analysis
]
[
Track Full Text
]
[
Subscribe
]
[
Scholar Register
]
[Indexed: 01/09/2023]
Abstract
Collapse
Key Words
Collapse
MESH Headings
Collapse
Grants
Collapse
Affiliation(s)
Collapse
3
A Survey of artificial immune applications.
Artif Intell Rev
2010. [DOI:
10.1007/s10462-010-9159-9
]
[
Citation(s) in
RCA
: 26
]
[
Impact Index Per Article: 1.9
]
[
Reference Citation Analysis
]
[
Track Full Text
]
[
Journal Information
]
[
Subscribe
]
[
Scholar Register
]
[Indexed: 10/19/2022]
Abstract
Collapse
Key Words
Collapse
MESH Headings
Collapse
Grants
Collapse
Affiliation(s)
Collapse
4
Detecting interest cache poisoning in sensor networks using an artificial immune algorithm.
APPL INTELL
2008. [DOI:
10.1007/s10489-008-0132-0
]
[
Citation(s) in
RCA
: 22
]
[
Impact Index Per Article: 1.4
]
[
Reference Citation Analysis
]
[
Track Full Text
]
[
Journal Information
]
[
Subscribe
]
[
Scholar Register
]
[Indexed: 11/27/2022]
Abstract
Collapse
Key Words
Collapse
MESH Headings
Collapse
Grants
Collapse
Affiliation(s)
Collapse
5
Shen X
, Gao XZ, Bie R. Artificial Immune Networks: Models and Applications.
INT J COMPUT INT SYS
2008. [DOI:
10.1080/18756891.2008.9727614
]
[
Citation(s) in
RCA
: 0
]
[
Impact Index Per Article: 0
]
[
Reference Citation Analysis
]
[
Track Full Text
]
[
Journal Information
]
[
Subscribe
]
[
Scholar Register
]
[Indexed: 10/26/2022]
Open
Abstract
Collapse
Key Words
Collapse
MESH Headings
Collapse
Grants
Collapse
Affiliation(s)
Collapse
6
Danger Is Ubiquitous: Detecting Malicious Activities in Sensor Networks Using the Dendritic Cell Algorithm.
LECTURE NOTES IN COMPUTER SCIENCE
2006. [DOI:
10.1007/11823940_30
]
[
Citation(s) in
RCA
: 33
]
[
Impact Index Per Article: 1.8
]
[
Reference Citation Analysis
]
[
Track Full Text
]
[
Subscribe
]
[
Scholar Register
]
[Indexed: 01/15/2023]
Abstract
Collapse
Key Words
Collapse
MESH Headings
Collapse
Grants
Collapse
Affiliation(s)
Collapse
Page 1 of 1
1
Loading…
Loading…
Export Articles to File
Export Citation Analysis
Export Citation Analysis
Article Number From
to
A maximum of 600 records can be exported at a time.
Format:
*
Excel
Plain Text
PDF
WORD
Invalid value
Loading…
Click to Download the Exported File
Loading…
Loading…
© 2004-2024 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA
Select the Category
Loading…
Loading…
Impact Index Per Article
Calculation for Impact Index Per Article
Times Cited ÷ Number of Years = Impact Index Per Article
TM
Loading…