Study of hybrid intrusion detection system
暂无分享,去创建一个
[1] Gulshan Kumar,et al. Evaluation Metrics for Intrusion Detection Systems - A Study , 2014 .
[2] Ingoo Han,et al. The neural network models for IDS based on the asymmetric costs of false negative errors and false positive errors , 2003, Expert Syst. Appl..
[3] S. Devaraju,et al. PERFORMANCE COMPARISON OF INTRUSION DETECTION SYSTEM USING VARIOUS TECHNIQUES – A REVIEW , 2013 .
[4] Sushil Jajodia,et al. Detecting Novel Network Intrusions Using Bayes Estimators , 2001, SDM.
[5] Jian Ma,et al. A new approach to intrusion detection using Artificial Neural Networks and fuzzy clustering , 2010, Expert Syst. Appl..
[6] S. Devaraju,et al. Performance analysis of intrusion detection system using various neural network classifiers , 2011, 2011 International Conference on Recent Trends in Information Technology (ICRTIT).
[7] Ulf Lindqvist,et al. Detecting computer and network misuse through the production-based expert system toolset (P-BEST) , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).
[8] Andrew Meneely,et al. Are Intrusion Detection Studies Evaluated Consistently? A Systematic Literature Review , 2016 .
[9] Timo Horeis. Intrusion Detection with Neural Networks – Combination of Self-Organizing Maps and Radial Basis Function Networks for Human Expert Integration , .
[10] James M. Keller,et al. A possibilistic fuzzy c-means clustering algorithm , 2005, IEEE Transactions on Fuzzy Systems.
[11] M. Shyu,et al. A Novel Anomaly Detection Scheme Based on Principal Component Classifier , 2003 .
[12] Jim Alves-Foss,et al. NATE: Network Analysis of Anomalous Traffic Events, a low-cost approach , 2001, NSPW '01.
[13] Kai Hwang,et al. Frequent Episode Rules for Intrusive Anomaly Detection with Internet Datamining , 2004 .