Framework for An Intelligent Rule-Based Network Intrusion Detection System
暂无分享,去创建一个
[1] Dorothy E. Denning,et al. An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.
[2] Harold S. Javitz,et al. The NIDES Statistical Component Description and Justification , 1994 .
[3] H. Bunke,et al. Hybrid techniques , 1988 .
[4] Chih-Jen Lin,et al. LIBSVM: A library for support vector machines , 2011, TIST.
[5] Jonatan Gómez,et al. Evolving Fuzzy Classifiers for Intrusion Detection , 2002 .
[6] Leonid Portnoy,et al. Intrusion detection with unlabeled data using clustering , 2000 .
[7] J. Ross Quinlan,et al. C4.5: Programs for Machine Learning , 1992 .
[8] David Aldous,et al. The Continuum Random Tree III , 1991 .
[9] Bernhard Pfahringer,et al. Winning the KDD99 classification cup: bagged boosting , 2000, SKDD.
[10] Ali A. Ghorbani,et al. A detailed analysis of the KDD CUP 99 data set , 2009, 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications.
[11] Ron Kohavi,et al. Scaling Up the Accuracy of Naive-Bayes Classifiers: A Decision-Tree Hybrid , 1996, KDD.
[12] C. Lucas,et al. Intrusion detection using a fuzzy genetics-based learning algorithm , 2007, J. Netw. Comput. Appl..
[13] Malcolm I. Heywood,et al. Training genetic programming on half a million patterns: an example from anomaly detection , 2005, IEEE Transactions on Evolutionary Computation.
[14] Salvatore J. Stolfo,et al. Data Mining Approaches for Intrusion Detection , 1998, USENIX Security Symposium.
[15] Bruce W. Suter,et al. The multilayer perceptron as an approximation to a Bayes optimal discriminant function , 1990, IEEE Trans. Neural Networks.
[16] Arthur B. Maccabe,et al. The architecture of a network level intrusion detection system , 1990 .
[17] Alexander Hofmann,et al. Intrusion Detection in Computer Networks with Neural and Fuzzy Classifiers , 2003, ICANN.
[18] Ali A. Ghorbani,et al. Y-means: a clustering method for intrusion detection , 2003, CCECE 2003 - Canadian Conference on Electrical and Computer Engineering. Toward a Caring and Humane Technology (Cat. No.03CH37436).
[19] Yuxin Ding,et al. Host-based intrusion detection using dynamic and static behavioral models , 2003, Pattern Recognit..
[20] Rachid Beghdad,et al. Critical study of neural networks in detecting intrusions , 2008, Comput. Secur..
[21] N. Ye,et al. A Scalable Clustering Technique for Intrusion Signature Recognition , 2001 .
[22] Siti Zaiton Mohd Hashim,et al. Intelligent Clustering with PCA and Unsupervised Learning Algorithm in Intrusion Alert Correlation , 2009, 2009 Fifth International Conference on Information Assurance and Security.
[23] Marc Dacier,et al. Intrusion detection , 1999, Comput. Networks.
[24] Leo Breiman,et al. Random Forests , 2001, Machine Learning.
[25] Pat Langley,et al. Estimating Continuous Distributions in Bayesian Classifiers , 1995, UAI.
[26] Eleazar Eskin,et al. Anomaly Detection over Noisy Data using Learned Probability Distributions , 2000, ICML.