Utilising fuzzy logic and trend analysis for effective intrusion detection
暂无分享,去创建一个
[1] Rebecca Gurley Bace,et al. Intrusion Detection , 2018, Encyclopedia of Social Network Analysis and Mining. 2nd Ed..
[2] Alexandr Seleznyov,et al. A Methodology to Detect Temporal Regularities in User Behavior for Anomaly Detection , 2001, SEC.
[3] M. Warner,et al. Information technology and strategy , 2002 .
[4] Riza C. Berkan,et al. Fuzzy System Design Principles , 1997 .
[5] Bart Kosko,et al. Neural networks and fuzzy systems , 1998 .
[6] R. Power. CSI/FBI computer crime and security survey , 2001 .
[7] John M. Carroll,et al. A Process Approach to Information Security Management , 1993, SEC.