Towards an Adaptive Intrusion Detection System: A Critical and Comparative Study
暂无分享,去创建一个
[1] Walter D. Potter,et al. A Blackboard-Based Learning Intrusion Detection System: A New Approach , 2003, IEA/AIE.
[2] A. K. Pujari,et al. Data Mining Techniques , 2006 .
[3] Xuan Dau Hoang,et al. Data Mining Methods for Network Intrusion Detection , 2004 .
[4] Mohammad Zulkernine,et al. Network Intrusion Detection using Random Forests , 2005, PST.
[5] Zhang Rui. A Survey of Intrusion Detection Systems , 2002 .
[6] James Cannady. Applying CMAC-based online learning to intrusion detection , 2000, Proceedings of the IEEE-INNS-ENNS International Joint Conference on Neural Networks. IJCNN 2000. Neural Computing: New Challenges and Perspectives for the New Millennium.
[7] Duminda Wijesekera,et al. Modern Intrusion Detection, Data Mining, and Degrees of Attack Guilt , 2002, Applications of Data Mining in Computer Security.
[8] Marc Dacier,et al. Towards a taxonomy of intrusion-detection systems , 1999, Comput. Networks.
[9] Zhang Yi,et al. A hierarchical intrusion detection model based on the PCA neural networks , 2007, Neurocomputing.
[10] Jaideep Srivastava,et al. Intrusion Detection: A Survey , 2005 .
[11] Andrew H. Sung,et al. Intrusion detection using an ensemble of intelligent paradigms , 2005, J. Netw. Comput. Appl..
[12] Salvatore J. Stolfo,et al. Adaptive Intrusion Detection: A Data Mining Approach , 2000, Artificial Intelligence Review.
[13] Cannady,et al. Next Generation Intrusion Detection: Autonomous Reinforcement Learning of Network Attacks , 2000 .
[14] Chunlin Zhang,et al. Intrusion detection using hierarchical neural networks , 2005, Pattern Recognit. Lett..
[15] Theodoros Lappas,et al. Data Mining Techniques for ( Network ) Intrusion Detection Systems , 2007 .
[16] Xin Xu. Adaptive Intrusion Detection Based on Machine Learning: Feature Extraction, Classifier Construction and Sequential Pattern Prediction , 2006 .