Artificial immune system: applications in computer security
"This book focuses on the technologies and applications of artificial immune systems in malware and spam detection proposed in recent years by the computation intelligence laboratory at Peking University, China. It offers a theoretical perspective and practical solutions to graduate students, p...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hoboken, New Jersey
Wiley
2016
|
Schlagworte: | |
Online-Zugang: | FHI01 FHN01 Volltext |
Zusammenfassung: | "This book focuses on the technologies and applications of artificial immune systems in malware and spam detection proposed in recent years by the computation intelligence laboratory at Peking University, China. It offers a theoretical perspective and practical solutions to graduate students, practitioners, and researchers working in the area of artificial immune system, machine learning, pattern recognition, and computer security"-- |
Beschreibung: | Includes index Description based on PDF viewed 09/20/2016 |
Beschreibung: | 1 Online-Resource (xxvii, 174 pages) |
ISBN: | 9781119076582 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV046418446 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 200211s2016 |||| o||u| ||||||eng d | ||
020 | |a 9781119076582 |9 978-1-119-07658-2 | ||
035 | |a (ZDB-35-WEL)7547468 | ||
035 | |a (OCoLC)1141115850 | ||
035 | |a (DE-599)BVBBV046418446 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-573 |a DE-92 | ||
082 | 0 | |a 005.8 |2 23 | |
100 | 1 | |a Tan, Ying |e Verfasser |4 aut | |
245 | 1 | 0 | |a Artificial immune system |b applications in computer security |c Ying Tan |
264 | 1 | |a Hoboken, New Jersey |b Wiley |c 2016 | |
300 | |a 1 Online-Resource (xxvii, 174 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes index | ||
500 | |a Description based on PDF viewed 09/20/2016 | ||
520 | |a "This book focuses on the technologies and applications of artificial immune systems in malware and spam detection proposed in recent years by the computation intelligence laboratory at Peking University, China. It offers a theoretical perspective and practical solutions to graduate students, practitioners, and researchers working in the area of artificial immune system, machine learning, pattern recognition, and computer security"-- | ||
650 | 4 | |a Artificial immune systems | |
650 | 4 | |a Computer security | |
650 | 4 | |a Computer networks |x Security measures | |
650 | 0 | 7 | |a Datenschutz |0 (DE-588)4011134-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Penetrationstest |0 (DE-588)4825817-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Malware |0 (DE-588)4687059-3 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 1 | |a Datenschutz |0 (DE-588)4011134-9 |D s |
689 | 0 | 2 | |a Penetrationstest |0 (DE-588)4825817-9 |D s |
689 | 0 | 3 | |a Malware |0 (DE-588)4687059-3 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
856 | 4 | 0 | |u https://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=7547468 |x Aggregator |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-35-WEL | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-031830918 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
966 | e | |u https://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=7547468 |l FHI01 |p ZDB-35-WEL |x Aggregator |3 Volltext | |
966 | e | |u https://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=7547468 |l FHN01 |p ZDB-35-WEL |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804180961882013696 |
---|---|
any_adam_object | |
author | Tan, Ying |
author_facet | Tan, Ying |
author_role | aut |
author_sort | Tan, Ying |
author_variant | y t yt |
building | Verbundindex |
bvnumber | BV046418446 |
collection | ZDB-35-WEL |
ctrlnum | (ZDB-35-WEL)7547468 (OCoLC)1141115850 (DE-599)BVBBV046418446 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02469nmm a2200517zc 4500</leader><controlfield tag="001">BV046418446</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">200211s2016 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119076582</subfield><subfield code="9">978-1-119-07658-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-35-WEL)7547468</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1141115850</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV046418446</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-573</subfield><subfield code="a">DE-92</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Tan, Ying</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Artificial immune system</subfield><subfield code="b">applications in computer security</subfield><subfield code="c">Ying Tan</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hoboken, New Jersey</subfield><subfield code="b">Wiley</subfield><subfield code="c">2016</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Resource (xxvii, 174 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Description based on PDF viewed 09/20/2016</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"This book focuses on the technologies and applications of artificial immune systems in malware and spam detection proposed in recent years by the computation intelligence laboratory at Peking University, China. It offers a theoretical perspective and practical solutions to graduate students, practitioners, and researchers working in the area of artificial immune system, machine learning, pattern recognition, and computer security"--</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Artificial immune systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Penetrationstest</subfield><subfield code="0">(DE-588)4825817-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Malware</subfield><subfield code="0">(DE-588)4687059-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Penetrationstest</subfield><subfield code="0">(DE-588)4825817-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Malware</subfield><subfield code="0">(DE-588)4687059-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=7547468</subfield><subfield code="x">Aggregator</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-35-WEL</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-031830918</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=7547468</subfield><subfield code="l">FHI01</subfield><subfield code="p">ZDB-35-WEL</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=7547468</subfield><subfield code="l">FHN01</subfield><subfield code="p">ZDB-35-WEL</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV046418446 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T08:44:05Z |
institution | BVB |
isbn | 9781119076582 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-031830918 |
oclc_num | 1141115850 |
open_access_boolean | |
owner | DE-573 DE-92 |
owner_facet | DE-573 DE-92 |
physical | 1 Online-Resource (xxvii, 174 pages) |
psigel | ZDB-35-WEL |
publishDate | 2016 |
publishDateSearch | 2016 |
publishDateSort | 2016 |
publisher | Wiley |
record_format | marc |
spelling | Tan, Ying Verfasser aut Artificial immune system applications in computer security Ying Tan Hoboken, New Jersey Wiley 2016 1 Online-Resource (xxvii, 174 pages) txt rdacontent c rdamedia cr rdacarrier Includes index Description based on PDF viewed 09/20/2016 "This book focuses on the technologies and applications of artificial immune systems in malware and spam detection proposed in recent years by the computation intelligence laboratory at Peking University, China. It offers a theoretical perspective and practical solutions to graduate students, practitioners, and researchers working in the area of artificial immune system, machine learning, pattern recognition, and computer security"-- Artificial immune systems Computer security Computer networks Security measures Datenschutz (DE-588)4011134-9 gnd rswk-swf Penetrationstest (DE-588)4825817-9 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Malware (DE-588)4687059-3 gnd rswk-swf Computersicherheit (DE-588)4274324-2 s Datenschutz (DE-588)4011134-9 s Penetrationstest (DE-588)4825817-9 s Malware (DE-588)4687059-3 s 1\p DE-604 https://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=7547468 Aggregator URL des Erstveröffentlichers Volltext 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Tan, Ying Artificial immune system applications in computer security Artificial immune systems Computer security Computer networks Security measures Datenschutz (DE-588)4011134-9 gnd Penetrationstest (DE-588)4825817-9 gnd Computersicherheit (DE-588)4274324-2 gnd Malware (DE-588)4687059-3 gnd |
subject_GND | (DE-588)4011134-9 (DE-588)4825817-9 (DE-588)4274324-2 (DE-588)4687059-3 |
title | Artificial immune system applications in computer security |
title_auth | Artificial immune system applications in computer security |
title_exact_search | Artificial immune system applications in computer security |
title_full | Artificial immune system applications in computer security Ying Tan |
title_fullStr | Artificial immune system applications in computer security Ying Tan |
title_full_unstemmed | Artificial immune system applications in computer security Ying Tan |
title_short | Artificial immune system |
title_sort | artificial immune system applications in computer security |
title_sub | applications in computer security |
topic | Artificial immune systems Computer security Computer networks Security measures Datenschutz (DE-588)4011134-9 gnd Penetrationstest (DE-588)4825817-9 gnd Computersicherheit (DE-588)4274324-2 gnd Malware (DE-588)4687059-3 gnd |
topic_facet | Artificial immune systems Computer security Computer networks Security measures Datenschutz Penetrationstest Computersicherheit Malware |
url | https://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=7547468 |
work_keys_str_mv | AT tanying artificialimmunesystemapplicationsincomputersecurity |