2017
DOI: 10.1166/asl.2017.8887
|View full text |Cite
|
Sign up to set email alerts
|

A Study on the Performances of Danger Theory and Negative Selection Algorithms for Mobile Spam Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2019
2019
2020
2020

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 0 publications
0
1
0
Order By: Relevance
“…Even though danger signals have a difficulty to be defined and classified, the AIS-based DT model has great interests and is applied in various application domains. Some of these applications include Fault Detection and Diagnoses (FDD) [192], e-mail Classification [193], Malware Detection [194], Social Network Water Army Detection [195], Rockbolts detection [196], Mobile Spam Detection [197], and IDSs which are our central concern in this research paper. Table 6 shows a list of various DT-based IDSs in the Wireless Sensor Networks (WSNs) with the used danger signals and misbehavior or attack detection for each detection system.…”
Section: F Dt-based Intrusion Detectionmentioning
confidence: 99%
“…Even though danger signals have a difficulty to be defined and classified, the AIS-based DT model has great interests and is applied in various application domains. Some of these applications include Fault Detection and Diagnoses (FDD) [192], e-mail Classification [193], Malware Detection [194], Social Network Water Army Detection [195], Rockbolts detection [196], Mobile Spam Detection [197], and IDSs which are our central concern in this research paper. Table 6 shows a list of various DT-based IDSs in the Wireless Sensor Networks (WSNs) with the used danger signals and misbehavior or attack detection for each detection system.…”
Section: F Dt-based Intrusion Detectionmentioning
confidence: 99%