000 03680cam a2200709 i 4500
005 20250919213644.0
006 m o d
007 cr |||||||||||
008 171212s2016 nju o 001 0 eng
010 _a2015-047440
020 _a9781119076278 (Adobe PDF)
020 _a1119076277 (Adobe PDF)
020 _a9781119076520 (ePub)
020 _a1119076528 (ePub)
020 _z9781119076285 (hardback)
020 _a9781119076582
020 _a1119076587
020 _z1119076285
024 7 _a10.1002/9781119076582
_2doi
029 1 _aCHNEW
_b000885409
029 1 _aCHVBK
_b37444109X
029 1 _aDEBBG
_bBV043894675
035 _a(OCoLC)930875632
_z(OCoLC)953458230
_z(OCoLC)953659337
_z(OCoLC)957955317
_z(OCoLC)958097565
_z(OCoLC)959884323
035 _a(OCoLC)ocn930875632
039 9 _a201902151002
_bmurni
_y12-12-2017
_zhafiz
_wMYUKM (1).mrc
_x735
040 _aDLC
_beng
_erda
_cDLC
_dYDX
_dOCLCF
_dVGM
_dYDXCP
_dDG1
_dCOO
_dIDEBK
_dNST
_dSTF
_dEBLCP
_dNLE
_dCHVBK
042 _apcc
049 _aMAIN
050 0 0 _aQA76.875
072 7 _aCOM
_x043050
_2bisacsh
082 0 0 _a005.8
_223
100 1 _aTan, Ying,
_d1964-
_eauthor.
245 1 0 _aArtificial immune system :
_bapplications in computer security /
_cYing Tan.
264 1 _aHoboken :
_bJohn Wiley & Sons Inc.,
_c2016.
300 _a1 online resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bn
_2rdamedia
338 _aonline resource
_bnc
_2rdacarrier
500 _aIncludes index.
504 _aIncludes bibliographical references and index.
505 0 _aArtificial Immune System -- Malware Detection -- Immune Principle and Neural Networks-Based Malware Detection -- Multiple-Point Bit Mutation Method of Detector Generation -- Malware Detection System Using Affinity Vectors -- Hierarchical Artificial Immune Model -- Negative Selection Algorithm with Penalty Factor -- Danger Feature-Based Negative Selection Algorithm -- Immune Concentration-Based Malware Detection Approaches -- Immune Cooperation Mechanism-Based Learning Framework -- Class-Wise Information Gai.
520 _a'This book focuses on the technologies and applications of artificial immune systems in malware and spam detection proposed in recent years by the computation intelligence laboratory at Peking University, China. It offers a theoretical perspective and practical solutions to graduate students, practitioners, and researchers working in the area of artificial immune system, machine learning, pattern recognition, and computer security'--
_cProvided by publisher.
588 _aDescription based on print version record and CIP data provided by publisher.
650 0 _aArtificial immune systems.
650 0 _aComputer security.
650 0 _aComputer networks
_xSecurity measures.
650 7 _aCOMPUTERS / Security / Cryptography.
_2bisacsh
650 7 _aArtificial immune systems.
_2fast
_0(OCoLC)fst00967933
650 7 _aComputer networks
_xSecurity measures.
_2fast
_0(OCoLC)fst00872341
650 7 _aComputer security.
_2fast
_0(OCoLC)fst00872484
655 4 _aElectronic books.
655 7 _aElectronic books.
_2local
773 0 _tWiley e-books
776 0 8 _iPrint version:
_aTan, Ying, author.
_tArtificial immune system
_dHoboken : John Wiley & Sons Inc., 2016
_z9781119076285
_w(DLC) 2015040514
856 4 0 _uhttps://eresourcesptsl.ukm.remotexs.co/user/login?url=http://onlinelibrary.wiley.com/book/10.1002/9781119076582
_zWiley Online Library
907 _a.b16544729
_b2022-11-16
_c2019-11-12
942 _n0
914 _avtls003629406
998 _ae
_b2017-12-12
_cm
_dz
_feng
_gnju
_y0
_z.b16544729
999 _c691416
_d691416