Integrated Intrusion Detection System Using Soft Computing
暂无分享,去创建一个
[1] M. R. Spiegel. E and M , 1981 .
[2] Ali A. Ghorbani,et al. A Feature Classification Scheme For Network Intrusion Detection , 2007, Int. J. Netw. Secur..
[3] Hong Shen,et al. An Observation-Centric Analysis on the Modeling of Anomaly-based Intrusion Detection , 2007, Int. J. Netw. Secur..
[4] Bernhard Sick,et al. Evolutionary optimization of radial basis function networks for intrusion detection , 2003, Proceedings of the International Joint Conference on Neural Networks, 2003..
[5] Ren Hui Gong,et al. A software implementation of a genetic algorithm based approach to network intrusion detection , 2005, Sixth International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing and First ACIS International Workshop on Self-Assembling Wireless Network.
[6] Chittur,et al. Model Generation for an Intrusion Detection System Using Genetic Algorithms , 2001 .
[7] O. Nasraoui,et al. Complete expression trees for evolving fuzzy classifier systems with genetic algorithms and application to network intrusion detection , 2002, 2002 Annual Meeting of the North American Fuzzy Information Processing Society Proceedings. NAFIPS-FLINT 2002 (Cat. No. 02TH8622).
[8] Christin Schäfer,et al. Learning Intrusion Detection: Supervised or Unsupervised? , 2005, ICIAP.
[9] V. Vaidehi,et al. Performance Analysis of Soft Computing Based Anomaly Detectors , 2008, Int. J. Netw. Secur..
[10] Fabio A. González,et al. An Evolutionary Approach to Generate Fuzzy Anomaly Signatures , 2003, IAW.
[11] Ali A. Ghorbani,et al. Research on Intrusion Detection and Response: A Survey , 2005, Int. J. Netw. Secur..
[12] Ge Yu,et al. Method of evolutionary neural network-based intrusion detection , 2001, 2001 International Conferences on Info-Tech and Info-Net. Proceedings (Cat. No.01EX479).
[13] Tarun Bhaskar,et al. A Hybrid Model for Network Security Systems: Integrating Intrusion Detection System with Survivability , 2008, Int. J. Netw. Secur..
[14] V. Rao Vemuri,et al. Use of K-Nearest Neighbor classifier for intrusion detection , 2002, Comput. Secur..
[15] S. Selvakani Kandeeban,et al. Improving ID performance using GA and NN , 2008, Int. J. Comput. Aided Eng. Technol..