相似文献/References:
[1]付玉珍 胡彧 张清华.一种新的自适应网络入侵检测模型[J].计算机技术与发展,2008,(09):148.
FU Yu-zhen,HU Yu,ZHANG Qing-hua.A New Model of Self- Adaptive Network Intrusion Detection[J].,2008,(12):148.
[2]张葵 袁细国.基于模糊集的免疫克隆选择算法[J].计算机技术与发展,2007,(12):24.
ZHANG Kui,YUAN Xi-guo.An Immune Colon Selective Algorithm Based on Fuzzy- Set[J].,2007,(12):24.
[3]任永昌 朱萍.克隆选择算法分析及其改进的研究与应用[J].计算机技术与发展,2012,(05):101.
REN Yong-chang,ZHU Ping.Research and Application of Clone Selection Algorithm Analysis and Its Improvement[J].,2012,(12):101.
[4]李京.基于危险理论的网络安全风险评估[J].计算机技术与发展,2012,(08):159.
LI Jing.Evaluation Model for Network Security RiskBased on Danger Theory[J].,2012,(12):159.