相似文献/References:
[1]郑钧泽 徐晓峰 郭东辉[].基于克隆选择算法的面向程序路径测试数据生成方法[J].计算机技术与发展,2009,(08):8.
ZHENG Jun-ze,XU Xiao-feng,GUO Dong-hui.A Path- Oriented Test Data Generation Approach Based on Clonal Selection Algorithm[J].,2009,(05):8.
[2]付玉珍 胡彧 张清华.一种新的自适应网络入侵检测模型[J].计算机技术与发展,2008,(09):148.
FU Yu-zhen,HU Yu,ZHANG Qing-hua.A New Model of Self- Adaptive Network Intrusion Detection[J].,2008,(05):148.
[3]李京.基于危险理论的网络安全风险评估[J].计算机技术与发展,2012,(08):159.
LI Jing.Evaluation Model for Network Security RiskBased on Danger Theory[J].,2012,(05):159.
[4]王倩云 罗玉漂 陈云芳.未知木马检测免疫算法的r值分析[J].计算机技术与发展,2012,(12):175.
WANG Qian-yun,LUO Yu-piao,CHEN Yun-fang.Numerical Analysis of r in Immune Algorithm of Unknown Trojan Detection[J].,2012,(05):175.
[5]伍海波,高劲松,唐启涛,等.基于生物免疫原理的网络入侵检测研究[J].计算机技术与发展,2013,(07):167.
WU Hai-bo[],GAO Jing-song[],TANG Qi-tao[],et al.Research on Network Intrusion Detection System Based on Biological Immune Principle[J].,2013,(05):167.
[6]张葵 袁细国.基于模糊集的免疫克隆选择算法[J].计算机技术与发展,2007,(12):24.
ZHANG Kui,YUAN Xi-guo.An Immune Colon Selective Algorithm Based on Fuzzy- Set[J].,2007,(05):24.