Application of artificial neural network in detection of DOS attacks
暂无分享,去创建一个
Abdullah Sharaf Alghamdi | Iftikhar Ahmad | Azween B. Abdullah | A. Abdullah | A. Alghamdi | I. Ahmad
[1] Elizabeth B. Lennon. Testing Intrusion Detection Systems , 2003 .
[2] Angel P. del Pobil,et al. Multiple self-organizing maps: A hybrid learning scheme , 1997, Neurocomputing.
[3] Sergio M. Savaresi,et al. Unsupervised learning techniques for an intrusion detection system , 2004, SAC '04.
[4] Laurene V. Fausett,et al. Fundamentals Of Neural Networks , 1994 .
[5] Iftikhar Ahmad,et al. Performance comparison between backpropagation algorithms applied to intrusion detection in computer network systems , 2008 .
[6] Morteza Amini,et al. RT-UNNID: A practical solution to real-time network-based intrusion detection using unsupervised neural networks , 2006, Comput. Secur..
[7] Azween Abdullah,et al. Artificial neural network approaches to intrusion detection: a review , 2009, IEEE ICT 2009.
[8] W.L.A. Neves,et al. Comparison between backpropagation and RPROP algorithms applied to fault classification in transmission lines , 2004, 2004 IEEE International Joint Conference on Neural Networks (IEEE Cat. No.04CH37541).
[9] Laurene V. Fausett,et al. Fundamentals Of Neural Networks , 1993 .
[10] Adeel Akram,et al. A comparative analysis of artificial neural network technologies in intrusion detection systems , 2006 .
[11] C. Douligeris,et al. Detecting denial of service attacks using emergent self-organizing maps , 2005, Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology, 2005..
[12] James Cannady,et al. Artificial Neural Networks for Misuse Detection , 1998 .
[13] Julie Greensmith,et al. Immune System Approaches to Intrusion Detection - A Review , 2004, ICARIS.
[14] Yang Wei,et al. Anomaly Intrusion Detection Approach Using Hybrid MLP/CNN Neural Network , 2006, Sixth International Conference on Intelligent Systems Design and Applications.
[15] Gürsel Serpen,et al. Application of Machine Learning Algorithms to KDD Intrusion Detection Dataset within Misuse Detection Context , 2003, MLMTA.
[16] Electronics Letters , 1965, Nature.
[17] Dorothy E. Denning,et al. An Intrusion-Detection Model , 1986, 1986 IEEE Symposium on Security and Privacy.
[18] James A. Mahaffey,et al. Multiple Self-Organizing Maps for Intrusion Detection , 2000 .
[19] Y. Tanabe,et al. Local Positioning with Artificial Neural Network and Time of Arrival Technique , 2008, 2008 3rd International Conference on Innovative Computing Information and Control.