Adaptive Ensemble Multi-Agent Based Intrusion Detection Model
暂无分享,去创建一个
[1] J. Ross Quinlan,et al. C4.5: Programs for Machine Learning , 1992 .
[2] Sandeep Kumar,et al. A Software Architecture to Support Misuse Intrusion Detection , 1995 .
[3] Steven Cheung,et al. The threat from the net [Internet security] , 1997 .
[4] Martin Roesch,et al. Snort - Lightweight Intrusion Detection for Networks , 1999 .
[5] Ajith Abraham,et al. Neuro Fuzzy Systems: Sate-of-the-Art Modeling Techniques , 2001, IWANN.
[6] Finn V. Jensen,et al. Bayesian Networks and Decision Graphs , 2001, Statistics for Engineering and Information Science.
[7] Eibe Frank,et al. A Simple Approach to Ordinal Classification , 2001, ECML.
[8] Ajith Abraham,et al. Intrusion Detection Using Ensemble of Soft Computing Paradigms , 2003 .
[9] Daoqiang Zhang,et al. Hybrid neural network and C4.5 for misuse detection , 2003, Proceedings of the 2003 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.03EX693).
[10] Sugata Sanyal,et al. Adaptive neuro-fuzzy intrusion detection systems , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..
[11] Andrew H. Sung,et al. Intrusion Detection Systems Using Adaptive Regression Splines , 2004, ICEIS.
[12] Andrew H. Sung,et al. Modeling intrusion detection systems using linear genetic programming approach , 2004 .
[13] J. Ross Quinlan,et al. Induction of Decision Trees , 1986, Machine Learning.
[14] Csilla Farkas,et al. PAID: A Probabilistic Agent-Based Intrusion Detection system , 2005, Comput. Secur..
[15] Cheng Xiang,et al. Design of Multiple-Level Hybrid Classifier for Intrusion Detection System , 2005 .
[16] Ajith Abraham,et al. Feature deduction and ensemble design of intrusion detection systems , 2005, Comput. Secur..
[17] Ajith Abraham,et al. Modeling intrusion detection system using hybrid intelligent systems , 2007, J. Netw. Comput. Appl..
[18] Yi Zhang,et al. Predicting intrusion goal using dynamic Bayesian network with transfer probability estimation , 2009, J. Netw. Comput. Appl..
[19] Aboul Ella Hassanien,et al. Developing Advanced Web Services through P2P Computing and Autonomous Agents: Trends and Innovations , 2010 .
[20] G. Bochmann,et al. Peer-to-Peer Platforms for High-Quality Web Services: The Case for Load-Balanced Clustered Peer-to-Peer Systems , 2010 .
[21] Liang Jie-Zhang. Innovations, Standards, and Practices of Web Services: Emerging Research Topics , 2011 .
[22] Nawal Guermouche,et al. Characterizing Compatibility of Timed Choreography , 2011, Int. J. Web Serv. Res..
[23] Fuchun Sun,et al. An Improved Particle Swarm Optimization Algorithm Based on Quotient Space Theory , 2012, Int. J. Softw. Sci. Comput. Intell..
[24] Laura Díaz,et al. Discovery of Geospatial Resources: Methodologies, Technologies, and Emergent Applications , 2012 .
[25] Derrick G. Kourie,et al. An Assessment of Several Taxonomies of Volunteered Geographic Information , 2012 .
[26] Ina Fourie. E‐activity and Intelligent Web Construction: Effects of Social Design , 2012 .
[27] Edward Pultar. Data Mining Location-Based Social Networks for Geospatial Discovery , 2012 .