A Framework for Hybrid Fuzzy Logic Intrusion Detection Systems
暂无分享,去创建一个
Mauricio Papa | Janica Edmonds | Aly El-Semary | Jesús González | M. Papa | A. El-Semary | J. Edmonds | Jesús González | Mauricio Papa | Janica Edmonds
[1] Susan M. Bridges,et al. Mining fuzzy association rules and fuzzy frequency episodes for intrusion detection , 2000, Int. J. Intell. Syst..
[2] Ramakrishnan Srikant,et al. Fast algorithms for mining association rules , 1998, VLDB 1998.
[3] Sergei Ovchinnikov,et al. Fuzzy Sets and Secure Computer Systems , 1994, Proceedings New Security Paradigms Workshop.
[4] Richard P. Lippmann,et al. 1999 DARPA Intrusion Detection Evaluation: Design and Procedures , 2001 .
[5] Salvatore J. Stolfo,et al. Data mining-based intrusion detectors: an overview of the columbia IDS project , 2001, SGMD.
[6] Heikki Mannila,et al. Discovering Generalized Episodes Using Minimal Occurrences , 1996, KDD.
[7] Lotfi A. Zadeh,et al. MAKING COMPUTERS THINK LIKE PEOPLE , 1984 .
[8] Jonatan Gómez,et al. Evolving Fuzzy Classifiers for Intrusion Detection , 2002 .
[9] Julie A. Dickerson,et al. Fuzzy network profiling for intrusion detection , 2000, PeachFuzz 2000. 19th International Conference of the North American Fuzzy Information Processing Society - NAFIPS (Cat. No.00TH8500).
[10] Jacinth Salome,et al. Fuzzy Data Mining and Genetic Algorithms Applied to Intrusion Detection , 2007 .
[11] Heikki Mannila,et al. Discovering Frequent Episodes in Sequences , 1995, KDD.
[12] Ramakrishnan Srikant,et al. Mining quantitative association rules in large relational tables , 1996, SIGMOD '96.
[13] Lotfi A. Zadeh,et al. Outline of a New Approach to the Analysis of Complex Systems and Decision Processes , 1973, IEEE Trans. Syst. Man Cybern..
[14] E. J. Friedman-hill,et al. Jess, the Java expert system shell , 1997 .
[15] Man Hon Wong,et al. Mining fuzzy association rules in databases , 1998, SGMD.
[16] Jaideep Srivastava,et al. Data Mining for Network Intrusion Detection , 2002 .
[17] Salvatore J. Stolfo,et al. Mining Audit Data to Build Intrusion Detection Models , 1998, KDD.
[18] Lotfi A. Zadeh,et al. The concept of a linguistic variable and its application to approximate reasoning-III , 1975, Inf. Sci..
[19] Robert Orchard,et al. Fuzzy Reasoning in JESS: The Fuzzyj Toolkit and Fuzzyjess , 2001, ICEIS.
[20] Hilary H. Hosmer,et al. Security is fuzzy!: applying the fuzzy logic paradigm to the multipolicy paradigm , 1993, NSPW '92-93.