Artificial intelligence approaches to network management: recent advances and a survey
暂无分享,去创建一个
[1] Subrahmanyam Dravida,et al. Fast restoration of ATM networks , 1994, IEEE J. Sel. Areas Commun..
[2] Atsushi Hiramatsu,et al. ATM communications network control by neural networks , 1990, IEEE Trans. Neural Networks.
[3] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[4] Faouzi Kamoun,et al. Neural networks for shortest path computation and routing in computer networks , 1993, IEEE Trans. Neural Networks.
[5] Josef Pieprzyk,et al. Intrusion Detection: A Survey , 1996 .
[6] C. D. Gelatt,et al. Optimization by Simulated Annealing , 1983, Science.
[7] M. Sloman. Network and distributed systems management , 1994 .
[8] Geoffrey E. Hinton,et al. Learning internal representations by error propagation , 1986 .
[9] J. Gechter,et al. Conceptual issues for ATM , 1989, IEEE Network.
[10] Tie Liao,et al. Network management: interoperability and information model , 1991, Comput. Commun..
[11] R. Saracco,et al. Modeling the user interface , 1993, IEEE Communications Magazine.
[12] B. Clifford Neuman,et al. Kerberos: An Authentication Service for Open Network Systems , 1988, USENIX Winter.
[13] S.E. Minzer,et al. Broadband ISDN and asynchronous transfer mode (ATM) , 1989, IEEE Communications Magazine.
[14] Eugene H. Spafford,et al. A PATTERN MATCHING MODEL FOR MISUSE INTRUSION DETECTION , 1994 .
[15] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[16] Edsger W. Dijkstra,et al. A note on two problems in connexion with graphs , 1959, Numerische Mathematik.
[17] Simon S. Lam,et al. Authentification for Distributed Systems , 1992, Computer.
[18] Dinesh Pai,et al. Omnipoint -The Implementation Version of Telecommunication Management Networks? , 1994, Proceedings of NOMS '94 - IEEE Network Operations and Management Symposium.
[19] Yun Peng,et al. Diagnostic problem‐solving with causal chaining , 1987, Int. J. Intell. Syst..
[20] Prem G Kumar,et al. Fault diagnosis of telecommunication networks: Realistic abductive reasoning approach , 1995 .
[21] S. Hayes. Analyzing network performance management , 1993, IEEE Communications Magazine.
[22] Jeffrey D. Case,et al. Simple Network Management Protocol (SNMP) , 1990, RFC.
[23] Keith McCloghrie,et al. Structure of Management Information for version 2 of the Simple Network Management Protocol (SNMPv2) , 1993, RFC.
[24] Kris Struyve,et al. End-to-end survivable broadband networks , 1995 .
[25] Robert Metcalfe,et al. Ethernet: distributed packet switching for local computer networks , 1976, CACM.
[26] Deborah Estrin,et al. Pricing in computer networks: motivation, formulation, and example , 1993, TNET.
[27] Christos H. Papadimitriou,et al. Local Search for the Asymmetric Traveling Salesman Problem , 1980, Oper. Res..
[28] B. Clifford Neuman,et al. Proxy-based authorization and accounting for distributed systems , 1993, [1993] Proceedings. The 13th International Conference on Distributed Computing Systems.
[29] Dean Allemang,et al. The Computational Complexity of Abduction , 1991, Artif. Intell..
[30] H. Prade,et al. Relational Approach To Fault Diagnosis BasedOn A Functional Model , 1970 .
[31] P. Venkataram,et al. Network performance tuning using reinforcement learning , 1998, IEEE GLOBECOM 1998 (Cat. NO. 98CH36250).
[32] R.N. Cronk,et al. Rule-based expert systems for network management and operations: an introduction , 1988, IEEE Network.
[33] Lillian N. Cassel,et al. Network management architectures and protocols: problems and approaches , 1989, IEEE J. Sel. Areas Commun..
[34] N. B. Seitz. Performance standards for packet-switched services , 1989, IEEE International Conference on Communications, World Prosperity Through Communications,.
[35] Dhadesugoor R. Vaman,et al. Reconfiguration for Service and Self-Healing in ATM Networks Based on Virtual Paths , 1997, Comput. Networks ISDN Syst..
[36] Sidnie Feit,et al. TCP/IP: Architecture, Protocols, and Implementation , 1993 .
[37] Ken-ichi Sato,et al. Virtual path restoration techniques based on centralized control functions , 1995 .
[38] Jeffery P. Hansen. The use of multi-dimensional parametric behavior of a CSMA/CD network for network diagnosis , 1992 .
[39] A. S. Sethi,et al. Bibliography on network management , 1989, CCRV.
[40] Pallapa Venkataram,et al. Network performance management using realistic abductive reasoning model , 1995, Integrated Network Management.
[41] Simon Znaty,et al. Annotated bibliography on network management , 1994, CCRV.
[42] J. Gruber. Performance and fault management functions for the maintenance of SONET/SDH and ATM transport networks , 1993, Proceedings of ICC '93 - IEEE International Conference on Communications.
[43] D. O'Mahony. Security considerations in a network management environment , 1994, IEEE Network.
[44] J. Reggia,et al. Abductive Inference Models for Diagnostic Problem-Solving , 1990, Symbolic Computation.
[45] Chia-Jiu Wang,et al. The use of artificial neural networks for optimal message routing , 1995 .
[46] James L. McClelland,et al. Parallel distributed processing: explorations in the microstructure of cognition, vol. 1: foundations , 1986 .
[47] S. Muftic,et al. Security Architecture for Open Distributed Systems , 1993 .
[48] V. Jagannathan,et al. Blackboard Architectures and Applications , 1989 .
[49] Ahmed Patel. Security management for OSI networks , 1994, Comput. Commun..
[50] Martín Abadi,et al. A logic of authentication , 1990, TOCS.
[51] H.E. Rauch,et al. Neural networks for routing communication traffic , 1988, IEEE Control Systems Magazine.
[52] V. Gullapalli,et al. Acquiring robot skills via reinforcement learning , 1994, IEEE Control Systems.
[53] Martin De Prycker. Evolution from ISDN to BISDN: a logical step towards ATM , 1989, Comput. Commun..
[54] Christopher S. Cooper. High-speed networks: the emergence of technologies for multiservice support , 1991, Comput. Commun..
[55] H. P Nii,et al. Blackboard Systems , 1986 .
[56] Yoshiaki Nemoto,et al. An SNMP-based Expert Network Management System , 1991 .
[57] Martin de Prycker,et al. Asynchronous transfer mode (2nd ed.): solution for broadband ISDN , 1993 .
[58] David B. Rose,et al. SNA Network Management Directions , 1988, IBM Syst. J..
[59] Richard A. Kemmerer,et al. State Transition Analysis: A Rule-Based Intrusion Detection Approach , 1995, IEEE Trans. Software Eng..
[60] Frank Feather,et al. Fault detection in an Ethernet network using anomaly signature matching , 1993, SIGCOMM 1993.
[61] P Venkataram,et al. Probabilistic Extension to Realistic Abductive Reasoning Model , 1996 .
[62] Lawrence Bernstein,et al. Expert systems in network management-the second revolution , 1988, IEEE J. Sel. Areas Commun..
[63] Chris Sluman. A Tutorial on OSI Management , 1989, Comput. Networks.
[64] Jean-Yves Le Boudec,et al. The Asynchronous Transfer Mode: A Tutorial , 1992, Comput. Networks ISDN Syst..
[65] Jeffrey C. Mogul,et al. Measured capacity of an Ethernet: myths and reality , 1988, CCRV.
[66] Jeffrey K. MacKie-Mason,et al. Some FAQs about Usage-Based Pricing , 1995, Comput. Networks ISDN Syst..
[67] Lawrence J. Fogel,et al. Artificial Intelligence through Simulated Evolution , 1966 .
[68] G Prem Kumar. Integrated Network Management Using Extended Blackboard Architecture , 1996 .
[69] A. Bouloutas,et al. Clustering schemes for network management , 1991, IEEE INFCOM '91. The conference on Computer Communications. Tenth Annual Joint Comference of the IEEE Computer and Communications Societies Proceedings.
[70] Narsingh Deo,et al. Graph Theory with Applications to Engineering and Computer Science , 1975, Networks.
[71] Lotfi A. Zadeh,et al. Outline of a New Approach to the Analysis of Complex Systems and Decision Processes , 1973, IEEE Trans. Syst. Man Cybern..
[72] Mohammad S. Obaidat,et al. A Multilayer Neural Network System for Computer Access Security , 1994, IEEE Trans. Syst. Man Cybern. Syst..
[73] Harry E. Pople,et al. Session 6 Theorem Proving and Logic: I I ON THE MECHANIZATION OF ABDUCTIVE LOGIC , 2006 .
[74] Derek McAuley,et al. Experiences of building an ATM switch for the local area , 1994, SIGCOMM 1994.
[75] Nirwan Ansari,et al. Neural Networks in Telecommunications , 1994, Springer US.
[76] Richard P. Lippmann,et al. An introduction to computing with neural nets , 1987 .
[77] A. A. Covo,et al. AI-assisted telecommunications network management , 1989, IEEE Global Telecommunications Conference, 1989, and Exhibition. 'Communications Technology for the 1990s and Beyond.
[78] F W Simonds. A MINERAL SURVEY IN TEXAS. , 1901, Science.
[79] J.D. Day,et al. The OSI reference model , 1983 .
[80] P. Chemouil,et al. Application of fuzzy control to adaptive traffic routing in telephone network , 1994 .
[81] A. Rau-Chaplin,et al. DAD: a real-time expert system for monitoring of data packet networks , 1988, IEEE Network.
[82] Todd L. Heberlein,et al. Network intrusion detection , 1994, IEEE Network.
[83] Vijay Varadharajan,et al. An analysis of the proxy problem in distributed systems , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.
[84] David B. Fogel,et al. Evolving artificial intelligence , 1992 .
[85] Hervé Debar,et al. A neural network component for an intrusion detection system , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.
[86] R.R. Voruganti. A global network management framework for the '90s , 1994, IEEE Communications Magazine.
[87] Carl E. Landwehr,et al. On Access Checking in Capability-Based Systems , 1987, IEEE Trans. Software Eng..
[88] Glenn Mansfield Keeni,et al. X.500 Directory Monitoring MIB , 1994, RFC.
[89] Robert Weihmayer,et al. Cooperative distributed problem solving for communication network management , 1990, Comput. Commun..
[90] Anthony S. Acampora. Broadband ISDN and Asynchronous Transfer Mode , 1994 .
[91] Jonathan L. Wang,et al. Integrated methodology for supporting packet network performance management and planning , 1990, Comput. Commun..
[92] D.S. Bauer,et al. NIDX-an expert system for real-time network intrusion detection , 1988, [1988] Proceedings. Computer Networking Symposium.
[93] Frank Edward Feather,et al. Fault detection in an Ethernet network via anomaly detectors , 1992 .
[94] Billy E. Gillett,et al. Introduction to Operations Research: A Computer-Oriented Algorithmic Approach , 1976 .
[95] James A. Reggia,et al. A formal model of diagnostic inference. I. Problem formulation and decomposition , 1985, Inf. Sci..
[96] J. Isberg. Charging in cordless telecommunication systems , 1991, IEEE Global Telecommunications Conference GLOBECOM '91: Countdown to the New Millennium. Conference Record.
[97] H. T. Mouftah,et al. Survey of ATM Switch Architectures , 1995, Comput. Networks ISDN Syst..
[98] B Ravindran,et al. A tutorial survey of reinforcement learning , 1994 .
[99] A. Hiramatsu,et al. Training techniques for neural network applications in ATM , 1995, IEEE Commun. Mag..
[100] Marvin A. Sirbu,et al. NetBill: an Internet commerce system optimized for network-delivered services , 1995, IEEE Wirel. Commun..
[101] Bruce W. Irish,et al. MAPCON: an expert system for configuration of MAP networks , 1988, IEEE J. Sel. Areas Commun..
[102] G. Prem Kumar,et al. Optimal Network Partitioning for Fault-Tolerant Network Management Using Evolutionary Programming , 1994, Inf. Process. Lett..
[103] P. Samarati,et al. Access control: principle and practice , 1994, IEEE Communications Magazine.
[104] John S. Baras,et al. MANDATE: MAnaging Networks Using DAtabase TEchnology , 1993, IEEE J. Sel. Areas Commun..
[105] Salvatore J. Stolfo,et al. ACE: An Expert System for Telephone Cable Maintenance , 1983, IJCAI.
[106] Yung Bok Kim,et al. Real-time packet network analysis for ISO/OSI performance management , 1990, [Proceedings] GLOBECOM '90: IEEE Global Telecommunications Conference and Exhibition.
[107] Atsushi Hiramatsu. ATM traffic Control Using Neural Networks , 1994 .
[108] G. Prem Kumar,et al. Network restoration using recurrent neural networks , 1998 .
[109] Gene A. Tagliarini,et al. Optimization Using Neural Networks , 1991, IEEE Trans. Computers.
[110] W. D. Grover,et al. The selfhealing network : A fast distributed restoration technique for networks using digital crossconnect machines , 1987 .
[111] Jeffrey K. MacKie-Mason,et al. Pricing Congestible Network Resources (Invited Paper) , 1995, IEEE J. Sel. Areas Commun..
[112] Georg Trausmuth,et al. Hierarchical Network Management: A Concept and Its Prototype in SNMPv2 , 1996, Comput. Networks ISDN Syst..
[113] Amar Gupta,et al. Principles of Expert Systems , 1988 .
[114] L. F. Pau,et al. Survey of expert systems for fault detection, test generation and maintenance , 1986 .
[115] G. Prem Kumar,et al. Security management architecture for access control to network resources , 1997 .
[116] James Malcolm,et al. IKBS in network management , 1990, Comput. Commun..
[117] B. L. Hitson. Knowledge-based monitoring and control: an approach to understanding behavior of TCP/IP network protocols , 1988, SIGCOMM 1988.
[118] T.E. Marques. A symptom-driven expert system for isolating and correcting network faults , 1988, IEEE Communications Magazine.
[119] Didier Dubois,et al. Possibilistic Abduction , 1992, IPMU.
[120] Bassam Hussien,et al. An application of fuzzy algorithms in a computer access security system , 1989, Pattern Recognit. Lett..
[121] L. Raman. CMISE functions and services , 1993, IEEE Communications Magazine.
[122] Keith McCloghrie,et al. Structure and identification of management information for TCP/IP-based internets , 1988, RFC.
[123] C. V. Ramamoorthy,et al. CLUSTERING TECHNIQUES FOR LARGE DISTRIBUTED SYSTEMS. , 1986 .
[124] I. Tokizawa,et al. Self-healing virtual path architecture in ATM networks , 1995 .
[125] Lawrence. Davis,et al. Handbook Of Genetic Algorithms , 1990 .
[126] Georg Gottlob,et al. The complexity of logic-based abduction , 1993, JACM.
[127] Alexander Gersht,et al. Real-Time Management of Telephone Operating Company Networks: Issues and Approaches , 1993, IEEE J. Sel. Areas Commun..
[128] S.C.A. Thomopoulos,et al. Neural network implementation of the shortest path algorithm for traffic routing in communication networks , 1989, International 1989 Joint Conference on Neural Networks.
[129] Dorothy E. Denning,et al. An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.
[130] Stephen A. Sherman,et al. Secure network access using multiple applications of AT&T's smart card , 1994, AT&T Technical Journal.
[131] Akira Hayashi,et al. Study of fault‐location expert systems for paired cables , 1991 .
[132] F. Halsall,et al. Protocol analyser for the monitoring and analysis of OSI networks , 1990, Comput. Commun..