Artificial Immune System: Applications in Computer Security
Wiley-IEEE | Security+. Encryption | June 27 2016 | ISBN-10: 1119076285 | 208 Pages | pdf | 11.2 MB
by Ying Tan (Author)
This book deals with malware detection in terms of Artificial Immune System (AIS), and presents a number of AIS models and immune-based feature extraction approaches as well as their applications in computer security
Covers all of the current achievements in computer security based on immune principles, which were obtained by the Computational Intelligence Laboratory of Peking University, China
Includes state-of-the-art information on designing and developing artificial immune systems (AIS) and AIS-based solutions to computer security issues
Presents new concepts such as immune danger theory, immune concentration, and class-wise information gain (CIG)
Download:
http://longfiles.com/2jcztx58rrsb/Artificial_Immune_System_Applications_in_Computer_Security.pdf.html
[Fast Download] Artificial Immune System: Applications in Computer Security
Basic Guide to System Safety
Hacking Android
Router Security Strategies: Securing IP Network Traffic Planes
Data Privacy Management, and Security Assurance
Cyber-Physical Attack Recovery Procedures: A Step-by-Step Preparation and Response Guide
Cryptographic Hardware and Embedded Systems - CHES 2004
Invasion of Privacy! Big Brother and the Company Hackers
Hacking : An unofficial anonymous guide : Windows and Internet
Systems Safety for the 21st Century
Efficient Secure Two-Party Protocols: Techniques and Constructions
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Malware, Rootkits & Botnets A Beginner's G(2247)
The Dark Net Searching: how to search anon(2173)
Tor and The Dark Net: Remain Anonymous Onl(2007)
Tor Browser: The Ultimate Guide To The Tor(1974)
Hacking Made Easy: Hack Your Way Through L(1928)
Cybersecurity for Beginners(1714)
Hacking Google Maps and Google Earth(1698)
Hacking For Dummies(1556)
Computer Virus: Introducing... Computer Vi(1533)
Penetration Testing with Raspberry Pi(1518)
The Artificial Intelligence Conspiracy: Ho(1499)
Principles of Computer Security Lab Manual(1475)
Understanding SSL: Securing Your Website T(1471)
Learning Network Forensics(1448)
Cyber Security Basics: Protect your organi(1433)
