| 000 | 03680cam a2200709 i 4500 | ||
|---|---|---|---|
| 005 | 20250919213644.0 | ||
| 006 | m o d | ||
| 007 | cr ||||||||||| | ||
| 008 | 171212s2016 nju o 001 0 eng | ||
| 010 | _a2015-047440 | ||
| 020 | _a9781119076278 (Adobe PDF) | ||
| 020 | _a1119076277 (Adobe PDF) | ||
| 020 | _a9781119076520 (ePub) | ||
| 020 | _a1119076528 (ePub) | ||
| 020 | _z9781119076285 (hardback) | ||
| 020 | _a9781119076582 | ||
| 020 | _a1119076587 | ||
| 020 | _z1119076285 | ||
| 024 | 7 |
_a10.1002/9781119076582 _2doi |
|
| 029 | 1 |
_aCHNEW _b000885409 |
|
| 029 | 1 |
_aCHVBK _b37444109X |
|
| 029 | 1 |
_aDEBBG _bBV043894675 |
|
| 035 |
_a(OCoLC)930875632 _z(OCoLC)953458230 _z(OCoLC)953659337 _z(OCoLC)957955317 _z(OCoLC)958097565 _z(OCoLC)959884323 |
||
| 035 | _a(OCoLC)ocn930875632 | ||
| 039 | 9 |
_a201902151002 _bmurni _y12-12-2017 _zhafiz _wMYUKM (1).mrc _x735 |
|
| 040 |
_aDLC _beng _erda _cDLC _dYDX _dOCLCF _dVGM _dYDXCP _dDG1 _dCOO _dIDEBK _dNST _dSTF _dEBLCP _dNLE _dCHVBK |
||
| 042 | _apcc | ||
| 049 | _aMAIN | ||
| 050 | 0 | 0 | _aQA76.875 |
| 072 | 7 |
_aCOM _x043050 _2bisacsh |
|
| 082 | 0 | 0 |
_a005.8 _223 |
| 100 | 1 |
_aTan, Ying, _d1964- _eauthor. |
|
| 245 | 1 | 0 |
_aArtificial immune system : _bapplications in computer security / _cYing Tan. |
| 264 | 1 |
_aHoboken : _bJohn Wiley & Sons Inc., _c2016. |
|
| 300 | _a1 online resource. | ||
| 336 |
_atext _btxt _2rdacontent |
||
| 337 |
_acomputer _bn _2rdamedia |
||
| 338 |
_aonline resource _bnc _2rdacarrier |
||
| 500 | _aIncludes index. | ||
| 504 | _aIncludes bibliographical references and index. | ||
| 505 | 0 | _aArtificial Immune System -- Malware Detection -- Immune Principle and Neural Networks-Based Malware Detection -- Multiple-Point Bit Mutation Method of Detector Generation -- Malware Detection System Using Affinity Vectors -- Hierarchical Artificial Immune Model -- Negative Selection Algorithm with Penalty Factor -- Danger Feature-Based Negative Selection Algorithm -- Immune Concentration-Based Malware Detection Approaches -- Immune Cooperation Mechanism-Based Learning Framework -- Class-Wise Information Gai. | |
| 520 |
_a'This book focuses on the technologies and applications of artificial immune systems in malware and spam detection proposed in recent years by the computation intelligence laboratory at Peking University, China. It offers a theoretical perspective and practical solutions to graduate students, practitioners, and researchers working in the area of artificial immune system, machine learning, pattern recognition, and computer security'-- _cProvided by publisher. |
||
| 588 | _aDescription based on print version record and CIP data provided by publisher. | ||
| 650 | 0 | _aArtificial immune systems. | |
| 650 | 0 | _aComputer security. | |
| 650 | 0 |
_aComputer networks _xSecurity measures. |
|
| 650 | 7 |
_aCOMPUTERS / Security / Cryptography. _2bisacsh |
|
| 650 | 7 |
_aArtificial immune systems. _2fast _0(OCoLC)fst00967933 |
|
| 650 | 7 |
_aComputer networks _xSecurity measures. _2fast _0(OCoLC)fst00872341 |
|
| 650 | 7 |
_aComputer security. _2fast _0(OCoLC)fst00872484 |
|
| 655 | 4 | _aElectronic books. | |
| 655 | 7 |
_aElectronic books. _2local |
|
| 773 | 0 | _tWiley e-books | |
| 776 | 0 | 8 |
_iPrint version: _aTan, Ying, author. _tArtificial immune system _dHoboken : John Wiley & Sons Inc., 2016 _z9781119076285 _w(DLC) 2015040514 |
| 856 | 4 | 0 |
_uhttps://eresourcesptsl.ukm.remotexs.co/user/login?url=http://onlinelibrary.wiley.com/book/10.1002/9781119076582 _zWiley Online Library |
| 907 |
_a.b16544729 _b2022-11-16 _c2019-11-12 |
||
| 942 | _n0 | ||
| 914 | _avtls003629406 | ||
| 998 |
_ae _b2017-12-12 _cm _dz _feng _gnju _y0 _z.b16544729 |
||
| 999 |
_c691416 _d691416 |
||