Last update: Fri Mar 2 02:06:23 MST 2018
Top |
Symbols |
Numbers |
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z
BibTeX entry
@Article{Hedberg:1996:ISC,
author = "S. Hedberg",
title = "Industry Spotlight: Combating computer viruses:
{IBM}'s new computer immune system",
journal = j-IEEE-PAR-DIST-TECH,
volume = "4",
number = "2",
pages = "9--11",
month = "Summer",
year = "1996",
CODEN = "IPDTEX",
DOI = "https://doi.org/10.1109/88.494599",
ISSN = "1063-6552 (print), 1558-1861 (electronic)",
ISSN-L = "1063-6552",
bibdate = "Thu Apr 10 19:14:33 MDT 1997",
bibsource = "http://www.math.utah.edu/pub/tex/bib/ieeepardisttech.bib",
URL = "http://dlib.computer.org/pd/books/pd1996/pdf/p2009.pdf",
acknowledgement = ack-nhfb,
classification = "C6130S (Data security); C6170K (Knowledge
engineering techniques)",
keywords = "AntiVirus; automatic virus; computer immune system;
computer viruses; detection; electronic immune system;
human/vertebrate; IBM; immune system; learning
(artificial intelligence); machine learning techniques;
product; prototype computer immune system; security of
data",
treatment = "P Practical",
}
Related entries
- artificial,
3(4)3
- automatic,
1(4)58,
2(1)32,
2(1)64,
2(3)8,
2(3)13,
2(3)37,
2(3)71,
2(3)73,
2(3)74,
2(4)9,
4(2)15
- C6130S,
1(4)41,
2(3)7,
4(4)4
- C6170K,
3(4)3
- detection,
2(3)37
- engineering,
1(1)43,
1(2)3,
1(2)21,
1(2)33,
1(4)23,
2(2)5,
2(2)37,
2(3)13,
2(3)71,
2(4)9,
2(4)32,
2(4)61,
3(1)4,
3(1)25,
3(1)37,
3(2)14,
3(2)22,
3(2)40,
3(2)52,
3(3)50,
3(4)3,
3(4)34,
3(4)44,
3(4)61,
4(1)74,
4(2)63
- Hedberg, S.,
4(4)4
- IBM,
1(2)73,
4(1)9,
4(2)89,
4(3)45,
4(4)12
- industry,
2(3)5,
2(3)10,
4(1)6,
4(4)8,
4(4)z-1
- intelligence,
3(4)3,
4(2)2
- knowledge,
3(4)3
- learning,
3(4)3
- machine,
1(1)25,
1(1)43,
1(2)62,
1(2)73,
2(1)26,
2(1)64,
2(2)17,
2(2)37,
2(2)50,
2(3)2,
2(3)5,
2(3)7,
2(3)8,
2(3)16,
2(3)76,
3(1)4,
3(1)37,
3(2)14,
3(3)20,
3(4)3,
3(4)34,
4(1)9,
4(1)43,
4(1)74,
4(1)84,
4(2)12,
4(2)26,
4(2)49,
4(3)15,
4(3)25,
4(3)36,
4(3)45,
4(3)63,
4(4)12,
4(4)36,
4(4)50
- new,
3(1)86,
3(2)72,
3(3)76,
3(4)96,
3(4)97,
4(1)6,
4(1)92,
4(1)93,
4(2)82,
4(3)2,
4(3)77,
4(3)78,
4(4)12,
4(4)85
- product,
3(1)86,
3(1)96,
3(2)72,
3(3)76,
3(4)80,
3(4)97,
3(4)104,
4(1)56,
4(1)93,
4(2)82,
4(2)96,
4(3)7,
4(3)78,
4(4)4,
4(4)8,
4(4)85
- prototype,
1(4)16,
2(3)16
- security,
1(4)41,
2(3)7,
2(4)32,
4(4)4
- Spotlight,
4(1)6,
4(4)z-1
- techniques,
1(1)6,
1(1)9,
1(1)25,
1(1)52,
1(2)3,
1(2)16,
1(2)21,
1(2)33,
1(2)49,
1(2)73,
1(3)33,
1(4)16,
2(1)9,
2(1)26,
2(1)32,
2(1)51,
2(1)64,
2(2)5,
2(2)8,
2(2)17,
2(2)30,
2(2)37,
2(2)57,
2(3)5,
2(3)7,
2(3)8,
2(3)10,
2(3)16,
2(3)37,
2(3)71,
2(3)72,
2(3)73,
2(4)9,
2(4)73,
3(1)4,
3(1)37,
3(1)75,
3(2)4,
3(2)14,
3(2)22,
3(2)40,
3(2)52,
3(3)50,
3(4)3,
3(4)12,
3(4)44,
3(4)61,
3(4)72,
4(1)6,
4(2)12,
4(2)15,
4(2)49,
4(2)89,
4(4)8,
4(4)23