Page 148 - 《软件学报》2021年第10期
P. 148

3120                                 Journal of Software  软件学报 Vol.32, No.10, October 2021

                 [7]    Eduardo V, Altair  S,  Alysson  B, Nuno N. BigFlow: Real-time and  reliable anomaly-based  intrusion  detection  for  high-speed
                     networks. Future Generation Computer Systems, 2019,93:473485. [doi: 10.1016/j.future.2018.09.051]
                 [8]    James  Z, Robert G,  Ilija V.  Anomaly  detection  in wide area  network meshes  using two machine  learning algorithms.  Future
                     Generation Computer Systems, 2019,93:418426. [doi: 10.1016/j.future.2018.07.023]
                 [9]    Yao ZY. Research on adaptive model of neighborhood immune detector [MS. Thesis]. Harbin: Harbin University of Science and
                     Technology, 2020 (in Chinese with English abstract). [doi: 10.27063/d.cnki.ghlgu.2020.000878]
                [10]    Wen  C, Santin A,  Tao  L. Parameter  analysis of negative  selection  algorithm. Information Sciences, 2017,420:218234. [doi:
                     10.1016/j.ins.2017.08.062]
                [11]    Yang T, Chen W, Li T. An antigen space density based real-value negative selection algorithm. Applied Soft Computing, 2017,61:
                     860874. [doi: 10.1016/j.asoc.2017.09.005]
                [12]    Zhang RR, Xiao X. A clone  selection  based real-valued  negative  selection algorithm. Complexity,  2018. [doi:  10.1155/2018/
                     2520940]
                [13]    Zhang  FB, XI L, Wang DW, Yue X. Neighborhood shape-space and  detection algorithm. Control and  Decision,  2011,26(10):
                     15621566 (in Chinese with English abstract). [doi: 10.13195/j.cd.2011.10.125.zhangfb.012]
                [14]    Jiao LC, Du HF. Development and prospect of the artificial immune system. Acta Electronica Sinica, 2003,31(10):15401548 (in
                     Chinese with English abstract). [doi: 10.3321/j.issn:0372-2112.2003.10.024]
                [15]    Yan Q, Xie WX. Research on and development of anomaly detection. Journal of Xidian University (Natural Science Edition), 2002,
                     29(1):128132 (in Chinese with English abstract). [doi: 10.3969/j.issn.1001-2400.2002.01.030]
                [16]    Yang DY, Chen JY. Research on detector generation algorithm based on multiple population GA. Acta Automatica Sinica, 2009,
                     35(4):425432 (in Chinese with English abstract). [doi: 10.3724/sp.j.1004.2009.00425]
                [17]    Sayed GI, Khoriba G, Haggag MH. A novel chaotic salp swarm algorithm for global optimization and feature selection. Applied
                     Intelligence, 2018,48(10):34623481. [doi: 10.1007/s10489-018-1158-6]
                [18]     Xia Z, Wang X, Zhou W, Li R, Wang C, Zhang C. Color medical image lossless watermarking using chaotic system and accurate
                     quaternion polar harmonic transforms. Signal Processing, 2019,157:108118. [doi: 10.1016/j.sigpro.2018.11.011]
                [19]    Wu T, Jin JG, Wei MJ. A Hash function algorithm based on variable parameter cascading chaos. Journal of Computer Research and
                     Development, 2016,53(3):674681 (in Chinese with English abstract). [doi: 10.7544/issn1000-1239.2016.20148155]
                [20]    Irshad A, Sher M, Chaudhary SA, Naqvi H, Farash MS. An efficient and anonymous multi-server authenticated key agreement
                     based on chaotic map without engaging registration centre. Journal of Supercomputing, 2016,72(4):122. [doi: 10.1007/s11227-
                     016-1688-9]
                [21]    Zhang N, Li ZZ, Zhang  JH. Negative  selection algorithm  based on chaos theory. Journal  of Sichuan University  (Engineering
                     Science Edition), 2006,38(1):124127 (in Chinese with English abstract). [doi: 10.3969/j.issn.1009-3087.2006.01.026]
                [22]    Asgari-Chenaghlu M, Balafar MA, Feizi-Derakhshi, MR. A novel image encryption algorithm based on polynomial combination of
                     chaotic maps and dynamic function generation. Signal Processing, 2019,157:113. [doi: 10.1016/j.sigpro.2018.11.010]
                [23]    Yousefi M,  Yousefi M, Ferreira  RPM, Kim JH, Fogliatto FS.  Chaotic genetic  algorithm  and adaboost  ensemble  metamodeling
                     approach for optimum resource planning in emergency departments. Artificial Intelligence in Medicine, 2017,84:2333. [doi: 10.
                     1016/j.artmed.2017.10.002]
                [24]    Sayed GI, Khoriba G, Haggag MH. A novel chaotic salp swarm algorithm for global optimization and feature selection. Applied
                     Intelligence, 2018,48(10):34623481. [doi: 10.1007/s10489-018-1158-6]
                [25]    Cui L, Xie XP, Wang XW, Luo Y, Liu J. Event-triggered single-network ADP method for constrained optimal tracking control of
                     continuous-time non-linear systems. Applied Mathematics and Computation, 2019,352:220234. [doi: 10.1016/j.amc.2019.01.066]
                [26]    Zhang FB, Wang TB. Negative selection algorithm for real-valued n-dimensional chaotic maps. Journal of Computer Research and
                     Development, 2013,50(7):13871398 (in Chinese with English abstract).
                [27]    Owais M, Osman MK. Complete hierarchical multi-objective genetic algorithm for transit network design problem. Expert Systems
                     with Applications, 2018,114:143154. [doi: 10.1016/j.eswa.2018.07.033]
                [28]    Das AK, Das S, Ghosh A. Ensemble feature selection using bi-objective genetic algorithm. Knowledge-based Systems, 2017,123:
                     116127. [doi: 10.1016/j.knosys.2017.02.013]
   143   144   145   146   147   148   149   150   151   152   153