Intrusion detection using a fuzzy genetics-based learning algorithm
暂无分享,去创建一个
[1] Hervé Debar,et al. A neural network component for an intrusion detection system , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.
[2] Martin A. Riedmiller,et al. A direct adaptive method for faster backpropagation learning: the RPROP algorithm , 1993, IEEE International Conference on Neural Networks.
[3] Manuel Valenzuela-Rendón,et al. The Fuzzy Classifier System: A Classifier System for Continuously Varying Variables , 1991, ICGA.
[4] Salvatore J. Stolfo,et al. Mining Audit Data to Build Intrusion Detection Models , 1998, KDD.
[5] Andrew H. Sung,et al. Intrusion detection using an ensemble of intelligent paradigms , 2005, J. Netw. Comput. Appl..
[6] Stefan Axelsson,et al. Intrusion Detection Systems: A Survey and Taxonomy , 2002 .
[7] S. Smith,et al. A Learning System Based on Genetic Algorithms , 1980 .
[8] Francisco Herrera,et al. Tuning fuzzy logic controllers by genetic algorithms , 1995, Int. J. Approx. Reason..
[9] Jerry M. Mendel,et al. Generating fuzzy rules by learning from examples , 1992, IEEE Trans. Syst. Man Cybern..
[10] Susan M. Bridges,et al. Mining fuzzy association rules and fuzzy frequency episodes for intrusion detection , 2000 .
[11] Andrew H. Sung,et al. Intrusion detection using neural networks and support vector machines , 2002, Proceedings of the 2002 International Joint Conference on Neural Networks. IJCNN'02 (Cat. No.02CH37290).
[12] Sankar K. Pal,et al. Self-organizing neural network as a fuzzy classifier , 1994, IEEE Trans. Syst. Man Cybern..
[13] William L. Fithen,et al. State of the Practice of Intrusion Detection Technologies , 2000 .
[14] James Cannady,et al. Artificial Neural Networks for Misuse Detection , 1998 .
[15] Michio Sugeno,et al. An introductory survey of fuzzy control , 1985, Inf. Sci..
[16] Peter G. Neumann,et al. EMERALD: Event Monitoring Enabling Responses to Anomalous Live Disturbances , 1997, CCS 2002.
[17] Alistair Munro,et al. Evolving fuzzy rule based controllers using genetic algorithms , 1996, Fuzzy Sets Syst..
[18] Stephen F. Smith,et al. A learning system based on genetic adaptive algorithms , 1980 .
[19] Shigeo Abe,et al. A method for fuzzy rules extraction directly from numerical data and its application to pattern classification , 1995, IEEE Trans. Fuzzy Syst..
[20] Hisao Ishibuchi,et al. Techniques and Applications of Genetic Algorithm-Based Methods for Designing Compact Fuzzy Classification Systems , 1999 .
[21] Eugene H. Spafford,et al. An Application of Pattern Matching in Intrusion Detection , 1994 .
[22] Martin Fodslette Møller,et al. A scaled conjugate gradient algorithm for fast supervised learning , 1993, Neural Networks.
[23] Lakhmi C. Jain,et al. Network and information security: A computational intelligence approach: Special Issue of Journal of Network and Computer Applications , 2007, J. Netw. Comput. Appl..
[24] H. Ishibuchi,et al. Distributed representation of fuzzy rules and its application to pattern classification , 1992 .
[25] D.E. Goldberg,et al. Classifier Systems and Genetic Algorithms , 1989, Artif. Intell..
[26] Jonatan Gómez,et al. Evolving Fuzzy Classifiers for Intrusion Detection , 2002 .
[27] John H. Holland,et al. Adaptation in Natural and Artificial Systems: An Introductory Analysis with Applications to Biology, Control, and Artificial Intelligence , 1992 .
[28] Salvatore J. Stolfo,et al. Using artificial anomalies to detect unknown and known network intrusions , 2003, Knowledge and Information Systems.
[29] Vasant Honavar,et al. Lightweight agents for intrusion detection , 2003, J. Syst. Softw..
[30] Eugene H. Spafford,et al. An architecture for intrusion detection using autonomous agents , 1998, Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217).
[31] Koral Ilgun,et al. USTAT: a real-time intrusion detection system for UNIX , 1993, Proceedings 1993 IEEE Computer Society Symposium on Research in Security and Privacy.
[32] Arthur B. Maccabe,et al. The architecture of a network level intrusion detection system , 1990 .
[33] Hervé Debar,et al. An application of a recurrent network to an intrusion detection system , 1992, [Proceedings 1992] IJCNN International Joint Conference on Neural Networks.
[34] Chuen-Chien Lee. FUZZY LOGIC CONTROL SYSTEMS: FUZZY LOGIC CONTROLLER - PART I , 1990 .
[35] Dorothy E. Denning,et al. An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.
[36] H. Ishibuchi,et al. A hybrid fuzzy genetics-based machine learning algorithm: hybridization of Michigan approach and Pittsburgh approach , 1999, IEEE SMC'99 Conference Proceedings. 1999 IEEE International Conference on Systems, Man, and Cybernetics (Cat. No.99CH37028).
[37] Dipankar Dasgupta,et al. Immunity-Based Intrusion Detection System: A General Framework , 1999 .
[38] Eugene H. Spafford,et al. Defending a Computer System Using Autonomous Agents , 1995 .
[39] Francisco Herrera,et al. Ten years of genetic fuzzy systems: current framework and new trends , 2004, Fuzzy Sets Syst..
[40] Rebecca Gurley Bace,et al. Intrusion Detection , 2018, Encyclopedia of Social Network Analysis and Mining. 2nd Ed..
[41] Graham J. Williams,et al. On-Line Unsupervised Outlier Detection Using Finite Mixtures with Discounting Learning Algorithms , 2000, KDD '00.
[42] Susan M. Bridges,et al. Mining fuzzy association rules and fuzzy frequency episodes for intrusion detection , 2000, Int. J. Intell. Syst..
[43] H. Ishibuchi,et al. A fuzzy classifier system that generates fuzzy if-then rules for pattern classification problems , 1995, Proceedings of 1995 IEEE International Conference on Evolutionary Computation.
[44] Hisao Ishibuchi,et al. Performance evaluation of fuzzy classifier systems for multidimensional pattern classification problems , 1999, IEEE Trans. Syst. Man Cybern. Part B.
[45] David E. Goldberg,et al. Genetic Algorithms in Search Optimization and Machine Learning , 1988 .
[46] Andrew H. Sung,et al. Feature Selection for Intrusion Detection with Neural Networks and Support Vector Machines , 2003 .
[47] Eugene H. Spafford,et al. Applying Genetic Programming to Intrusion Detection , 1995 .