Review Article

A Survey of Artificial Immune System Based Intrusion Detection

Figure 6

The lifecycle of a detector [20].
156790.fig.006