相似文献/References:
[1]安丽丽,方贤进.树突细胞算法在线分析组件的研究[J].计算机技术与发展,2014,24(01):147.
AN Li-li,FANG Xian-jin.Study of Dendritic Cell Algorithm Online Analysis Module[J].,2014,24(08):147.
[2]付玉珍 胡彧 张清华.一种新的自适应网络入侵检测模型[J].计算机技术与发展,2008,(09):148.
FU Yu-zhen,HU Yu,ZHANG Qing-hua.A New Model of Self- Adaptive Network Intrusion Detection[J].,2008,(08):148.
[3]张葵 袁细国.基于模糊集的免疫克隆选择算法[J].计算机技术与发展,2007,(12):24.
ZHANG Kui,YUAN Xi-guo.An Immune Colon Selective Algorithm Based on Fuzzy- Set[J].,2007,(08):24.
[4]任永昌 朱萍.克隆选择算法分析及其改进的研究与应用[J].计算机技术与发展,2012,(05):101.
REN Yong-chang,ZHU Ping.Research and Application of Clone Selection Algorithm Analysis and Its Improvement[J].,2012,(08):101.
[5]王倩云 罗玉漂 陈云芳.未知木马检测免疫算法的r值分析[J].计算机技术与发展,2012,(12):175.
WANG Qian-yun,LUO Yu-piao,CHEN Yun-fang.Numerical Analysis of r in Immune Algorithm of Unknown Trojan Detection[J].,2012,(08):175.