Comparing local search with respect to genetic evolution to detect intrusions in computer networks
暂无分享,去创建一个
[1] J. Ross Quinlan,et al. C4.5: Programs for Machine Learning , 1992 .
[2] Terran Lane,et al. An Application of Machine Learning to Anomaly Detection , 1999 .
[3] Salvatore J. Stolfo,et al. Mining in a data-flow environment: experience in network intrusion detection , 1999, KDD '99.
[4] Dorothy E. Denning,et al. An Intrusion-Detection Model , 1986, 1986 IEEE Symposium on Security and Privacy.
[5] Robert K. Cunningham,et al. Results of the DARPA 1998 Offline Intrusion Detection Evaluation , 1999, Recent Advances in Intrusion Detection.
[6] Ryszard S. Michalski,et al. A theory and methodology of inductive learning , 1993 .
[7] Carla E. Brodley,et al. Approaches to Online Learning and Concept Drift for User Identification in Computer Security , 1998, KDD.
[8] D. E. Goldberg,et al. Genetic Algorithms in Search , 1989 .
[9] William W. Cohen. Fast Effective Rule Induction , 1995, ICML.
[10] David E. Goldberg,et al. Genetic Algorithms in Search Optimization and Machine Learning , 1988 .
[11] Michael Schatz,et al. Learning Program Behavior Profiles for Intrusion Detection , 1999, Workshop on Intrusion Detection and Network Monitoring.
[12] Filippo Neri,et al. Search-Intensive Concept Induction , 1995, Evolutionary Computation.
[13] Eugene H. Spafford,et al. A pattern-matching model for intrusion detection , 1994 .
[14] John J. Grefenstette,et al. A Coevolutionary Approach to Learning Sequential Decision Rules , 1995, ICGA.
[15] Stephanie Forrest,et al. A sense of self for Unix processes , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[16] Filippo Neri,et al. Exploring the Power of Genetic Search in Learning Symbolic Classifiers , 1996, IEEE Trans. Pattern Anal. Mach. Intell..