![Antivirus software / Intrusion detection system / Computing / Threat / Immune system / Computer virus / Artificial intelligence / AAFID / Anomaly-based intrusion detection system / Computer security / Computer network security / Cyberwarfare Antivirus software / Intrusion detection system / Computing / Threat / Immune system / Computer virus / Artificial intelligence / AAFID / Anomaly-based intrusion detection system / Computer security / Computer network security / Cyberwarfare](https://www.pdfsearch.io/img/7c32a941c7917bb5f9977f07a3714942.jpg)
| Document Date: 1999-11-05 00:00:00 Open Document File Size: 83,18 KBShare Result on Facebook
City Proposed Immunity / / Company Computer Immune Systems / / / Facility Computer Science Mathematical Sciences Department The University of Memphis Memphis / University of New Mexico / / IndustryTerm negativeselection algorithm / visualization tools / built-in tools / negative-selection algorithm / information processing capabilities / computer security systems / user applications / proposed negative-selection algorithm / natural immune systems / agent software toolkit / updated software systems / on-line system / software/programs use / computing / negative selection algorithm / real-time monitoring / natural systems / software architecture / networked computing activities / autonomous agent systems / target network / local software/hardware configuration / / OperatingSystem UNIX / DOS / / Organization University of Memphis Memphis / University of New Mexico / General Framework Dipankar Dasgupta Division / / Person Stephanie Forrest / Framework Dipankar Dasgupta / / / Position signature extractor / security manager / / ProgrammingLanguage Java / / ProvinceOrState New Mexico / / Technology negativeselection algorithm / negative selection algorithm / Java / proposed negative-selection algorithm / UNIX / antibodies / virtual memory / operating systems / negative-selection algorithm / GUI / /
SocialTag |