Artificial immune system: applications in computer security
"This book focuses on the technologies and applications of artificial immune systems in malware and spam detection proposed in recent years by the computation intelligence laboratory at Peking University, China. It offers a theoretical perspective and practical solutions to graduate students, p...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hoboken, New Jersey
John Wiley & Sons Inc.,
[2016]
|
Schlagworte: | |
Online-Zugang: | FRO01 UBG01 Volltext |
Zusammenfassung: | "This book focuses on the technologies and applications of artificial immune systems in malware and spam detection proposed in recent years by the computation intelligence laboratory at Peking University, China. It offers a theoretical perspective and practical solutions to graduate students, practitioners, and researchers working in the area of artificial immune system, machine learning, pattern recognition, and computer security"-- |
Beschreibung: | Includes bibliographical references and index Artificial Immune System -- Malware Detection -- Immune Principle and Neural Networks-Based Malware Detection -- Multiple-Point Bit Mutation Method of Detector Generation -- Malware Detection System Using Affinity Vectors -- Hierarchical Artificial Immune Model -- Negative Selection Algorithm with Penalty Factor -- Danger Feature-Based Negative Selection Algorithm -- Immune Concentration-Based Malware Detection Approaches -- Immune Cooperation Mechanism-Based Learning Framework -- Class-Wise Information Gai |
Beschreibung: | 1 online resource |
ISBN: | 1119076528 1119076587 9781119076520 9781119076582 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043768634 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 160916s2016 |||| o||u| ||||||eng d | ||
020 | |a 1119076528 |9 1-119-07652-8 | ||
020 | |a 1119076587 |9 1-119-07658-7 | ||
020 | |a 9781119076520 |c Online |9 978-1-119-07652-0 | ||
020 | |a 9781119076582 |9 978-1-119-07658-2 | ||
024 | 7 | |a 10.1002/9781119076582 |2 doi | |
035 | |a (ZDB-35-WIC)ocn930875632 | ||
035 | |a (OCoLC)1141115850 | ||
035 | |a (DE-599)BVBBV043768634 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-861 | ||
082 | 0 | |a 005.8 | |
100 | 1 | |a Tan, Ying |d 1964- |4 aut | |
245 | 1 | 0 | |a Artificial immune system |b applications in computer security |c Ying Tan |
264 | 1 | |a Hoboken, New Jersey |b John Wiley & Sons Inc., |c [2016] | |
300 | |a 1 online resource | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and index | ||
500 | |a Artificial Immune System -- Malware Detection -- Immune Principle and Neural Networks-Based Malware Detection -- Multiple-Point Bit Mutation Method of Detector Generation -- Malware Detection System Using Affinity Vectors -- Hierarchical Artificial Immune Model -- Negative Selection Algorithm with Penalty Factor -- Danger Feature-Based Negative Selection Algorithm -- Immune Concentration-Based Malware Detection Approaches -- Immune Cooperation Mechanism-Based Learning Framework -- Class-Wise Information Gai | ||
520 | |a "This book focuses on the technologies and applications of artificial immune systems in malware and spam detection proposed in recent years by the computation intelligence laboratory at Peking University, China. It offers a theoretical perspective and practical solutions to graduate students, practitioners, and researchers working in the area of artificial immune system, machine learning, pattern recognition, and computer security"-- | ||
650 | 7 | |a COMPUTERS / Security / Networking |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / Cryptography |2 bisacsh | |
650 | 7 | |a Artificial immune systems |2 fast | |
650 | 7 | |a Computer networks / Security measures |2 fast | |
650 | 7 | |a Computer security |2 fast | |
650 | 4 | |a Artificial immune systems | |
650 | 4 | |a Computer security | |
650 | 4 | |a Computer networks / Security measures | |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Malware |0 (DE-588)4687059-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Penetrationstest |0 (DE-588)4825817-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datenschutz |0 (DE-588)4011134-9 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 1 | |a Datenschutz |0 (DE-588)4011134-9 |D s |
689 | 0 | 2 | |a Penetrationstest |0 (DE-588)4825817-9 |D s |
689 | 0 | 3 | |a Malware |0 (DE-588)4687059-3 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
710 | 2 | |a IEEE Computer Society |e Sonstige |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druckausgabe |z 978-1-119-07628-5 |
856 | 4 | 0 | |u https://onlinelibrary.wiley.com/doi/book/10.1002/9781119076582 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-35-WIC | ||
940 | 1 | |q UBG_PDA_WIC | |
999 | |a oai:aleph.bib-bvb.de:BVB01-029179812 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
966 | e | |u https://onlinelibrary.wiley.com/doi/book/10.1002/9781119076582 |l FRO01 |p ZDB-35-WIC |q FRO_PDA_WIC |x Verlag |3 Volltext | |
966 | e | |u https://onlinelibrary.wiley.com/doi/book/10.1002/9781119076582 |l UBG01 |p ZDB-35-WIC |q UBG_PDA_WIC |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804176589441728512 |
---|---|
any_adam_object | |
author | Tan, Ying 1964- |
author_facet | Tan, Ying 1964- |
author_role | aut |
author_sort | Tan, Ying 1964- |
author_variant | y t yt |
building | Verbundindex |
bvnumber | BV043768634 |
collection | ZDB-35-WIC |
ctrlnum | (ZDB-35-WIC)ocn930875632 (OCoLC)1141115850 (DE-599)BVBBV043768634 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03577nmm a2200661zc 4500</leader><controlfield tag="001">BV043768634</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">160916s2016 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1119076528</subfield><subfield code="9">1-119-07652-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1119076587</subfield><subfield code="9">1-119-07658-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119076520</subfield><subfield code="c">Online</subfield><subfield code="9">978-1-119-07652-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119076582</subfield><subfield code="9">978-1-119-07658-2</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1002/9781119076582</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-35-WIC)ocn930875632</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1141115850</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043768634</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-861</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Tan, Ying</subfield><subfield code="d">1964-</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Artificial immune system</subfield><subfield code="b">applications in computer security</subfield><subfield code="c">Ying Tan</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hoboken, New Jersey</subfield><subfield code="b">John Wiley & Sons Inc.,</subfield><subfield code="c">[2016]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Artificial Immune System -- Malware Detection -- Immune Principle and Neural Networks-Based Malware Detection -- Multiple-Point Bit Mutation Method of Detector Generation -- Malware Detection System Using Affinity Vectors -- Hierarchical Artificial Immune Model -- Negative Selection Algorithm with Penalty Factor -- Danger Feature-Based Negative Selection Algorithm -- Immune Concentration-Based Malware Detection Approaches -- Immune Cooperation Mechanism-Based Learning Framework -- Class-Wise Information Gai</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"This book focuses on the technologies and applications of artificial immune systems in malware and spam detection proposed in recent years by the computation intelligence laboratory at Peking University, China. It offers a theoretical perspective and practical solutions to graduate students, practitioners, and researchers working in the area of artificial immune system, machine learning, pattern recognition, and computer security"--</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / Networking</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / Cryptography</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Artificial immune systems</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Artificial immune systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks / Security measures</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Malware</subfield><subfield code="0">(DE-588)4687059-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Penetrationstest</subfield><subfield code="0">(DE-588)4825817-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Penetrationstest</subfield><subfield code="0">(DE-588)4825817-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Malware</subfield><subfield code="0">(DE-588)4687059-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">IEEE Computer Society</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druckausgabe</subfield><subfield code="z">978-1-119-07628-5</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119076582</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-35-WIC</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">UBG_PDA_WIC</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029179812</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119076582</subfield><subfield code="l">FRO01</subfield><subfield code="p">ZDB-35-WIC</subfield><subfield code="q">FRO_PDA_WIC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119076582</subfield><subfield code="l">UBG01</subfield><subfield code="p">ZDB-35-WIC</subfield><subfield code="q">UBG_PDA_WIC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043768634 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:34:35Z |
institution | BVB |
isbn | 1119076528 1119076587 9781119076520 9781119076582 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029179812 |
oclc_num | 930875632 1141115850 |
open_access_boolean | |
owner | DE-861 |
owner_facet | DE-861 |
physical | 1 online resource |
psigel | ZDB-35-WIC UBG_PDA_WIC ZDB-35-WIC FRO_PDA_WIC ZDB-35-WIC UBG_PDA_WIC |
publishDate | 2016 |
publishDateSearch | 2016 |
publishDateSort | 2016 |
publisher | John Wiley & Sons Inc., |
record_format | marc |
spelling | Tan, Ying 1964- aut Artificial immune system applications in computer security Ying Tan Hoboken, New Jersey John Wiley & Sons Inc., [2016] 1 online resource txt rdacontent c rdamedia cr rdacarrier Includes bibliographical references and index Artificial Immune System -- Malware Detection -- Immune Principle and Neural Networks-Based Malware Detection -- Multiple-Point Bit Mutation Method of Detector Generation -- Malware Detection System Using Affinity Vectors -- Hierarchical Artificial Immune Model -- Negative Selection Algorithm with Penalty Factor -- Danger Feature-Based Negative Selection Algorithm -- Immune Concentration-Based Malware Detection Approaches -- Immune Cooperation Mechanism-Based Learning Framework -- Class-Wise Information Gai "This book focuses on the technologies and applications of artificial immune systems in malware and spam detection proposed in recent years by the computation intelligence laboratory at Peking University, China. It offers a theoretical perspective and practical solutions to graduate students, practitioners, and researchers working in the area of artificial immune system, machine learning, pattern recognition, and computer security"-- COMPUTERS / Security / Networking bisacsh COMPUTERS / Security / Cryptography bisacsh Artificial immune systems fast Computer networks / Security measures fast Computer security fast Artificial immune systems Computer security Computer networks / Security measures Computersicherheit (DE-588)4274324-2 gnd rswk-swf Malware (DE-588)4687059-3 gnd rswk-swf Penetrationstest (DE-588)4825817-9 gnd rswk-swf Datenschutz (DE-588)4011134-9 gnd rswk-swf Computersicherheit (DE-588)4274324-2 s Datenschutz (DE-588)4011134-9 s Penetrationstest (DE-588)4825817-9 s Malware (DE-588)4687059-3 s 1\p DE-604 IEEE Computer Society Sonstige oth Erscheint auch als Druckausgabe 978-1-119-07628-5 https://onlinelibrary.wiley.com/doi/book/10.1002/9781119076582 Verlag URL des Erstveröffentlichers Volltext 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Tan, Ying 1964- Artificial immune system applications in computer security COMPUTERS / Security / Networking bisacsh COMPUTERS / Security / Cryptography bisacsh Artificial immune systems fast Computer networks / Security measures fast Computer security fast Artificial immune systems Computer security Computer networks / Security measures Computersicherheit (DE-588)4274324-2 gnd Malware (DE-588)4687059-3 gnd Penetrationstest (DE-588)4825817-9 gnd Datenschutz (DE-588)4011134-9 gnd |
subject_GND | (DE-588)4274324-2 (DE-588)4687059-3 (DE-588)4825817-9 (DE-588)4011134-9 |
title | Artificial immune system applications in computer security |
title_auth | Artificial immune system applications in computer security |
title_exact_search | Artificial immune system applications in computer security |
title_full | Artificial immune system applications in computer security Ying Tan |
title_fullStr | Artificial immune system applications in computer security Ying Tan |
title_full_unstemmed | Artificial immune system applications in computer security Ying Tan |
title_short | Artificial immune system |
title_sort | artificial immune system applications in computer security |
title_sub | applications in computer security |
topic | COMPUTERS / Security / Networking bisacsh COMPUTERS / Security / Cryptography bisacsh Artificial immune systems fast Computer networks / Security measures fast Computer security fast Artificial immune systems Computer security Computer networks / Security measures Computersicherheit (DE-588)4274324-2 gnd Malware (DE-588)4687059-3 gnd Penetrationstest (DE-588)4825817-9 gnd Datenschutz (DE-588)4011134-9 gnd |
topic_facet | COMPUTERS / Security / Networking COMPUTERS / Security / Cryptography Artificial immune systems Computer networks / Security measures Computer security Computersicherheit Malware Penetrationstest Datenschutz |
url | https://onlinelibrary.wiley.com/doi/book/10.1002/9781119076582 |
work_keys_str_mv | AT tanying artificialimmunesystemapplicationsincomputersecurity AT ieeecomputersociety artificialimmunesystemapplicationsincomputersecurity |