Articolul precedent |
Articolul urmator |
1164 16 |
Ultima descărcare din IBN: 2021-11-04 09:26 |
Căutarea după subiecte similare conform CZU |
004.021 (9) |
Știința și tehnologia calculatoarelor. Calculatoare. Procesarea datelor (4235) |
SM ISO690:2012 SHEIKH, Kanza, REHMAN, Saad, KHAN KHATTAK, Muazzam A., RIAZ, Farhan. Security Risk Detection Algorithms in Artificial Immune Systems. In: Information Technologies, Systems And Networks, 17-18 octombrie 2017, Chisinau. Chisinau: Editura ULIM, 2017, Volumul 1, pp. 86-98. ISBN 978-9975-45-069-0. |
EXPORT metadate: Google Scholar Crossref CERIF DataCite Dublin Core |
Information Technologies, Systems And Networks Volumul 1, 2017 |
||||||
Conferința "Information Technologies, Systems And Networks" Chisinau, Moldova, 17-18 octombrie 2017 | ||||||
|
||||||
CZU: 004.021 | ||||||
Pag. 86-98 | ||||||
|
||||||
Descarcă PDF | ||||||
Rezumat | ||||||
Artificial Immune Systems (AIS) are algorithms with the origin from principles and functioning of the innate immune system. These algorithms exploit the characteristics of biological immune systems like learning and memory as a way to formulate problem. To prevent and minimize the security risks, there is severe need to integrate the Artificially Immune Systems for the security of networks. In the recent years various AIS algorithms with fabulous functionality have been proposed. In order to give the comprehensive review of all the AIS algorithms meant for risk detection and give direction for further research, a review of the AIS algorithms is discussed in depth in this paper. Qualitatively, based on primary algorithms, we show that all these algorithms once done with classification for the first time do not check its validity of being correctly classified. So we found that deterministic DCA is best among all the existing techniques of AIS based risk detection and proposed Enhanced Dendric Cell Algorithm (EDCA) to make it more efficient. |
||||||
Cuvinte-cheie artificial, immune, system, response, Risk, detection, Security, algorithm, automated |
||||||
|
Crossref XML Export
<?xml version='1.0' encoding='utf-8'?> <doi_batch version='4.3.7' xmlns='http://www.crossref.org/schema/4.3.7' xmlns:xsi='http://www.w3.org/2001/XMLSchema-instance' xsi:schemaLocation='http://www.crossref.org/schema/4.3.7 http://www.crossref.org/schema/deposit/crossref4.3.7.xsd'> <head> <doi_batch_id>ibn-60424</doi_batch_id> <timestamp>1716296510</timestamp> <depositor> <depositor_name>Information Society Development Instiute, Republic of Moldova</depositor_name> <email_address>idsi@asm.md</email_address> </depositor> </head> <body> <collection> <collection_metadata> <full_title>Information Technologies, Systems And Networks</full_title> </collection_metadata> <collection_issue> <publication_date media_type='print'> <year>2017</year> </publication_date> <isbn>978-9975-45-069-0</isbn> </collection_issue> <collection_article publication_type='full_text'><titles> <title>Security Risk Detection Algorithms in Artificial Immune Systems</title> </titles> <contributors> <person_name sequence='first' contributor_role='author'> <given_name>Kanza</given_name> <surname>Sheikh</surname> </person_name> <person_name sequence='additional' contributor_role='author'> <given_name>Saad</given_name> <surname>Rehman</surname> </person_name> <person_name sequence='additional' contributor_role='author'> <given_name>Muazzam A.</given_name> <surname>Khan Khattak</surname> </person_name> <person_name sequence='additional' contributor_role='author'> <given_name>Farhan </given_name> <surname>Riaz</surname> </person_name> </contributors> <publication_date media_type='print'> <year>2017</year> </publication_date> <pages> <first_page>86</first_page> <last_page>98</last_page> </pages> </collection_article> </collection> </body> </doi_batch>