Cited By
View all- Wu SBanzhaf W(2010)ReviewApplied Soft Computing10.1016/j.asoc.2009.06.01910:1(1-35)Online publication date: 1-Jan-2010
- Lau HTimmis JBate I(2009)Anomaly detection inspired by immune network theoryProceedings of the Eleventh conference on Congress on Evolutionary Computation10.5555/1689599.1690005(3045-3051)Online publication date: 18-May-2009
- Liu FTian Y(2006)Intrusion detection based on clustering organizational co-evolutionary classificationProceedings of the Third international conference on Fuzzy Systems and Knowledge Discovery10.1007/11881599_139(1113-1120)Online publication date: 24-Sep-2006