DC Field | Value | Language |
---|---|---|
dc.contributor.author | Tang, W. | - |
dc.contributor.author | Yang, X.-M. | - |
dc.contributor.author | Xie, X. | - |
dc.contributor.author | Peng, L.-M. | - |
dc.contributor.author | Youn, ChanHyun | - |
dc.contributor.author | Cao, Y. | - |
dc.date.accessioned | 2013-03-28T09:24:27Z | - |
dc.date.available | 2013-03-28T09:24:27Z | - |
dc.date.created | 2012-02-06 | - |
dc.date.issued | 2010-06-16 | - |
dc.identifier.citation | 2010 IEEE 18th International Workshop on Quality of Service, IWQoS 2010, v., no., pp. - | - |
dc.identifier.uri | http://hdl.handle.net/10203/164502 | - |
dc.language | ENG | - |
dc.publisher | IWQoS | - |
dc.title | Avidity-model based clonal selection algorithm for network intrusion detection | - |
dc.type | Conference | - |
dc.identifier.scopusid | 2-s2.0-77956588400 | - |
dc.type.rims | CONF | - |
dc.citation.publicationname | 2010 IEEE 18th International Workshop on Quality of Service, IWQoS 2010 | - |
dc.identifier.conferencecountry | China | - |
dc.identifier.conferencecountry | China | - |
dc.contributor.localauthor | Youn, ChanHyun | - |
dc.contributor.nonIdAuthor | Tang, W. | - |
dc.contributor.nonIdAuthor | Yang, X.-M. | - |
dc.contributor.nonIdAuthor | Xie, X. | - |
dc.contributor.nonIdAuthor | Peng, L.-M. | - |
dc.contributor.nonIdAuthor | Cao, Y. | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.