• Reference Citation Analysis
  • v
  • v
  • Find an Article
Find an Article PDF (4623447)   Today's Articles (1084)   Subscriber (49407)
For: Mohammadi M, Akbari A, Raahemi B, Nassersharif B, Asgharian H. A fast anomaly detection system using probabilistic artificial immune algorithm capable of learning new attacks. Evol Intel 2014;6:135-56. [DOI: 10.1007/s12065-013-0101-3] [Citation(s) in RCA: 14] [Impact Index Per Article: 1.3] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/25/2022]
Number Cited by Other Article(s)
1
Aswani R, Ghrera SP, Chandra S, Kar AK. A hybrid evolutionary approach for identifying spam websites for search engine marketing. EVOLUTIONARY INTELLIGENCE 2020. [DOI: 10.1007/s12065-020-00461-1] [Citation(s) in RCA: 3] [Impact Index Per Article: 0.8] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 12/24/2022]
2
Kumar V, Das AK, Sinha D. UIDS: a unified intrusion detection system for IoT environment. EVOLUTIONARY INTELLIGENCE 2019. [DOI: 10.1007/s12065-019-00291-w] [Citation(s) in RCA: 26] [Impact Index Per Article: 5.2] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/29/2022]
3
NSNAD: negative selection-based network anomaly detection approach with relevant feature subset. Neural Comput Appl 2019. [DOI: 10.1007/s00521-019-04396-2] [Citation(s) in RCA: 13] [Impact Index Per Article: 2.6] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/25/2022]
4
Bigdeli E, Mohammadi M, Raahemi B, Matwin S. Incremental anomaly detection using two-layer cluster-based structure. Inf Sci (N Y) 2018. [DOI: 10.1016/j.ins.2017.11.023] [Citation(s) in RCA: 11] [Impact Index Per Article: 1.8] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/18/2022]
5
Okamoto T, Tarao M. An artificial immunity-enhancing module for internet servers against cyberattacks. ARTIFICIAL LIFE AND ROBOTICS 2018. [DOI: 10.1007/s10015-018-0426-1] [Citation(s) in RCA: 3] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/28/2022]
6
A novel multi-population coevolution strategy for single objective immune optimization algorithm. Neural Comput Appl 2016. [DOI: 10.1007/s00521-016-2507-1] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/21/2022]
7
D’angelo G, Palmieri F, Ficco M, Rampone S. An uncertainty-managing batch relevance-based approach to network anomaly detection. Appl Soft Comput 2015. [DOI: 10.1016/j.asoc.2015.07.029] [Citation(s) in RCA: 47] [Impact Index Per Article: 5.2] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/29/2022]
8
A novel multi-population coevolution immune optimization algorithm. Soft comput 2015. [DOI: 10.1007/s00500-015-1724-3] [Citation(s) in RCA: 5] [Impact Index Per Article: 0.6] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 01/10/2023]
9
Bigdeli E, Mohammadi M, Raahemi B, Matwin S. A fast and noise resilient cluster-based anomaly detection. Pattern Anal Appl 2015. [DOI: 10.1007/s10044-015-0484-0] [Citation(s) in RCA: 3] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/23/2022]
PrevPage 1 of 1 1Next
© 2004-2024 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA