ANOMALY NETWORK INTRUSION DETECTION SYSTEM BASED ON DISTRIBUTED TIME-DELAY NEURAL NETWORK (DTDNN)
暂无分享,去创建一个
[1] Longbing Cao,et al. Novel Intrusion Detection using Probabilistic Neural Network and Adaptive Boosting , 2009, ArXiv.
[2] Francisco Maciá Pérez,et al. Intrusion Detection Method Using Neural Networks Based on the Reduction of Characteristics , 2009, IWANN.
[3] Rung Ching Chen,et al. Using Rough Set and Support Vector Machine for Network Intrusion Detection System , 2009, 2009 First Asian Conference on Intelligent Information and Database Systems.
[4] Detecting Network Intrusions Using Signal Processing with Query-Based Sampling Filter , 2009, EURASIP J. Adv. Signal Process..
[5] S. Selvakani. Escalate Intrusion Detection using GA - NN , 2009 .
[6] Vladimir Golovko,et al. Intrusion Detection in TCP/IP Networks Using Immune Systems Paradigm and Neural Network Detectors , 2009 .
[7] Mohammed El-Beltagy,et al. Artificial Neural Networks Architecture For Intrusion Detection Systems and Classification of Attacks , 2007 .
[8] Manas Ranjan Patra,et al. NETWORK INTRUSION DETECTION USING NAÏVE BAYES , 2007 .
[9] Morteza Amini,et al. RT-UNNID: A practical solution to real-time network-based intrusion detection using unsupervised neural networks , 2006, Comput. Secur..
[10] Francisco Ibarra,et al. Application of Neural Networks in Network Control and Information Security , 2006, ISNN.
[11] Abdulkader A. Alfantookh,et al. DoS Attacks Intelligent Detection using Neural Networks , 2006, J. King Saud Univ. Comput. Inf. Sci..
[12] Sheng-Hsun Hsu,et al. Application of SVM and ANN for intrusion detection , 2005, Comput. Oper. Res..
[13] Sang-Kyoon Kim,et al. An intrusion detection system using principal component analysis and time delay neural network , 2005, Proceedings of 7th International Workshop on Enterprise networking and Computing in Healthcare Industry, 2005. HEALTHCOM 2005..
[14] Andrew H. Sung,et al. Intrusion detection using an ensemble of intelligent paradigms , 2005, J. Netw. Comput. Appl..
[15] Muazzam Ahmed Siddiqui,et al. HIGH PERFORMANCE DATA MINING TECHNIQUES FOR INTRUSION DETECTION , 2004 .
[16] Mehdi MORADI,et al. A Neural Network Based System for Intrusion Detection and Classification of Attacks , 2004 .
[17] Shawn Ostermann,et al. Detecting Anomalous Network Traffic with Self-organizing Maps , 2003, RAID.
[18] Richard P. Lippmann,et al. An Overview of Issues in Testing Intrusion Detection Systems , 2003 .
[19] Chunlin Zhang,et al. Comparison of BPL and RBF Network in Intrusion Detection System , 2003, RSFDGrC.
[20] Andrew H. Sung,et al. Feature Selection for Intrusion Detection with Neural Networks and Support Vector Machines , 2003 .
[21] M.I. Heywood,et al. Host-based intrusion detection using self-organizing maps , 2002, Proceedings of the 2002 International Joint Conference on Neural Networks. IJCNN'02 (Cat. No.02CH37290).
[22] Prasert Kanthamanon,et al. Hybrid Neural Networks for Intrusion Detection System , 2002 .
[23] Ulrich Ultes-Nitsche,et al. An Intelligent Firewall to Detect Novel Attacks An Integrated Approach based on Anomaly Detection Against Virus Attacks , 2002 .
[24] Kimmo Hätönen,et al. A computer host-based user anomaly detection system using the self-organizing map , 2000, Proceedings of the IEEE-INNS-ENNS International Joint Conference on Neural Networks. IJCNN 2000. Neural Computing: New Challenges and Perspectives for the New Millennium.
[25] James Cannady. Applying CMAC-based online learning to intrusion detection , 2000, Proceedings of the IEEE-INNS-ENNS International Joint Conference on Neural Networks. IJCNN 2000. Neural Computing: New Challenges and Perspectives for the New Millennium.
[26] James A. Mahaffey,et al. Multiple Self-Organizing Maps for Intrusion Detection , 2000 .
[27] James Cannady,et al. Artificial Neural Networks for Misuse Detection , 1998 .
[28] Hervé Debar,et al. A neural network component for an intrusion detection system , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.
[29] Journal of Engineering Science and Technology Review , 2022 .
[30] Timo Horeis. Intrusion Detection with Neural Networks – Combination of Self-Organizing Maps and Radial Basis Function Networks for Human Expert Integration , .