메뉴 건너뛰기




Volumn 378, Issue , 2012, Pages 221-242

Combating security threats via immunity and adaptability in cognitive radio networks

Author keywords

[No Author keywords available]

Indexed keywords


EID: 82255165234     PISSN: 1860949X     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-3-642-23229-9_10     Document Type: Conference Paper
Times cited : (1)

References (14)
  • 5
    • 0034546374 scopus 로고    scopus 로고
    • Architecture for an artificial immune system
    • Hofmeyr, S.: Architecture for an artificial immune system. Evolutionary Computation 8(3), 443-473 (2000)
    • (2000) Evolutionary Computation , vol.8 , Issue.3 , pp. 443-473
    • Hofmeyr, S.1
  • 6
    • 82255173489 scopus 로고    scopus 로고
    • ICT Regulation Toolkit:, Tech. rep.
    • ICT Regulation Toolkit: What is spectrum trading. Tech. rep., (2010), http://www.ictregulationtoolkit.org.
    • (2010) What is Spectrum Trading
  • 7
    • 70449645212 scopus 로고
    • Systemic prolegomena to theoretical cybernetics
    • Wroclaw University of Technology
    • Jaroń, J.: Systemic prolegomena to theoretical cybernetics. In: Scientific Papers of Institute of Technical Cybernetics, vol. (45). Wroclaw University of Technology (1978)
    • (1978) Scientific Papers of Institute of Technical Cybernetics , vol.45
    • Jaroń, J.1
  • 8
    • 0034870039 scopus 로고    scopus 로고
    • Towards an artificial immune system for network intrusion detection: An investigation of clonal selection with a negative selection operator
    • Jungwon, K., Bentley, P.: Towards an artificial immune system for network intrusion detection: An investigation of clonal selection with a negative selection operator. In: Proceedings of the Congress on Evolutionary Computation (2001)
    • (2001) Proceedings of the Congress on Evolutionary Computation
    • Jungwon, K.1    Bentley, P.2
  • 14


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.