期刊文献+

多维云模型定义的危险信号产生机制 被引量:2

A Danger Signal Producing Mechanism Defined by the Multidimensional Cloud Model
下载PDF
导出
摘要 危险信号的产生机制是危险理论的核心问题。云模型是描述不确定性概念的工具。本文借鉴多维云模型的思想来判定计算机系统参数的变化,产生危险信号并构造多概念云,用以划分危险等级。最后,我们综合危险信号与现有AIS识别机制构造了协同免疫识别模型。 The producing mechanism for danger signals is the most important thing of the danger theory used in AIS. The cloud model is a tool to describe uncertain concepts. This paper uses a multidimensional cloud model for reference in order to determine the parameter changes of a computer system, and produce danger signals and construct multi-concept clouds in order to partition danger levels. By colligating danger signals and the commonly used AIS recognition mechanism, we construct a synergetic immunity recognition model.
作者 杨鹤 郑幸
出处 《计算机工程与科学》 CSCD 2007年第4期124-127,共4页 Computer Engineering & Science
基金 湖北教育学院院管青年课题"计算机免疫中的危险感知研究"
关键词 人工免疫 危险理论 危险信号 artificial immunity danger theory danger signal
  • 相关文献

参考文献6

  • 1Aickelin U,Cayzer S.The Danger Theory and Its Application to Artificial Immune Systems[C].Proc of the 1st Int'l Conf on Artificial Immune Systems[A].2002.141-148.
  • 2Aickelin U,Bentley P,Cayzer S,et al.Danger Theory:The Link Between AIS and IDS?[A].Proc of the 2nd Int'l Conf on Artificial Immune Systems[C].2003.147-155.
  • 3Greensmith J,Aickelin U,Twycross J.Detecting Danger:Applying a Novel Immunological Concept to Intrusion Detection Systems[A].Proc of the 6th Int'l Conf in Adaptive Computing in Design and Manufacture[C].2004.1135-1142.
  • 4Bentley P J,Greensmith J,Ujjin S.Two Ways to Grow Tissue for Artificial Immune Systems[A].Proc of the 4th Int'l Conf on Artificial Immune Systems[C].2005.139-152.
  • 5赵卫伟,李德毅.基于云模型的入侵检测方法[J].计算机工程与应用,2003,39(26):158-160. 被引量:15
  • 6杨鹤,董红斌,梁意文,谭成予.人工免疫系统中危险信号的云方法定义[J].计算机工程与应用,2006,42(10):34-36. 被引量:8

二级参考文献18

  • 1李德毅,刘常昱.论正态云模型的普适性[J].中国工程科学,2004,6(8):28-34. 被引量:895
  • 2李德毅,孟海军,史雪梅.隶属云和隶属云发生器[J].计算机研究与发展,1995,32(6):15-20. 被引量:1238
  • 3周宁.[D].通信工程学院,2000.
  • 4周宁.[D].通信工程学院,2000.
  • 5Frank J.Artificial Intelligence and Intrusion Detection:Current and future directions[C].In:Proceedings of the 17th National Computer Security Conference, 1994-10.
  • 6Helman P,Bhangoo J.A statistically base system for prioritizing information exploration under uncertainty[J].IEEE Transactions on Systems, Man and Cybernetics, Part A : Systems and Humans, 1997 ; 27 : 449-466.
  • 7Ghost A,Schwartzbard A.A study in using neural networks for an- omaly and misuse detection[C].In:Proceedings of the Eighth USENIX Security Symposium, 1999.
  • 8Crosbie M,Spafford E.Defending a computer system using autonomous agents[C].In:Proceedings of the 18th National Information Systems Security Conference, 1995-10.
  • 9Dipankar Dasgupta,Fabio A Gonzalez.An Intelligent Decision Support System for Intrusion Detection and Response.Lecture Notes in Computer Science, 2001.
  • 10JE Dickerson,JA Dickerson.Fuzzy Network Profiling for Intrusion Detection[C].In:Proc of Fuzzy Information Processing Society,2000.

共引文献19

同被引文献24

  • 1于瀛,侯朝桢.基于危险理论的免疫识别新算法[J].控制与决策,2005,20(9):1026-1029. 被引量:5
  • 2王娟,慈林林,姚康泽.特征选择方法综述[J].计算机工程与科学,2005,27(12):68-71. 被引量:64
  • 3王晓华,胡友健,柏柳.变形监测研究现状综述[J].测绘科学,2006,31(2):130-132. 被引量:69
  • 4孙满利,王旭东,李最雄,谌文武.交河故城的裂隙特征研究[J].岩土工程学报,2007,29(4):612-617. 被引量:23
  • 5Casciati F,Faravellia L,Rossia R.Architecture optimization for wireless sensor networks. Proceedings of SPIE the International Society for Optical Engineering . 2005
  • 6Ceriotti M,Mottola L,Picco G P,et al.Monitoring heritage buildings with wireless sensor networks:The torre aquila deployment. Proc of the2009Int Conf on Information Processing in Sensor Networks . 2009
  • 7de Brito L M P L,Peralta L M R,Santos F E S,et al.Wireless sensor networks applied to museums environmental monitoring. Proc of the4th Int Conf on Wireless and Mobile Communication . 2008
  • 8Ming X,Yabo D,Dongming L,et al.A wireless sensor system for long-term microclimate sonitoring in wildland cultural heritage sites. Proc of the2008IEEE Int Symp on Parallel and Distributed Processing with Applications . 2008
  • 9Guoqiang M,Baris F,Brian D O A.Wireless sensor network localization techniques. Computer Networks . 2007
  • 10L.Dong,L.Wei,C.Li.Demonstration of a WSN application in relic protection and an optimized system deployment tool. Proc.of the 7th Int.Conf.on Information Processing in Sensor Networks . 2008

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部