Intelligent intrusion detection system
暂无分享,去创建一个
[1] Jerry M. Mendel,et al. Generating fuzzy rules by learning from examples , 1992, IEEE Trans. Syst. Man Cybern..
[2] Hilary H. Hosmer,et al. Security is fuzzy!: applying the fuzzy logic paradigm to the multipolicy paradigm , 1993, NSPW '92-93.
[3] Shigeo Abe,et al. A method for fuzzy rules extraction directly from numerical data and its application to pattern classification , 1995, IEEE Trans. Fuzzy Syst..
[4] Sumit Ghosh,et al. A fundamental framework for network security , 1997 .
[5] A. Lekova,et al. Method for fuzzy rules extraction from numerical data , 1997, Proceedings of 12th IEEE International Symposium on Intelligent Control.
[6] Salvatore J. Stolfo,et al. A data mining framework for building intrusion detection models , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).
[7] Julie A. Dickerson,et al. Fuzzy network profiling for intrusion detection , 2000, PeachFuzz 2000. 19th International Conference of the North American Fuzzy Information Processing Society - NAFIPS (Cat. No.00TH8500).
[8] Salvatore J. Stolfo,et al. A framework for constructing features and models for intrusion detection systems , 2000, TSEC.
[9] Erland Jonsson,et al. Anomaly-based intrusion detection: privacy concerns and other problems , 2000, Comput. Networks.
[10] S. V. Raghavan,et al. Intrusion detection through learning behavior model , 2001, Comput. Commun..
[11] Julie A. Dickerson,et al. Fuzzy intrusion detection , 2001, Proceedings Joint 9th IFSA World Congress and 20th NAFIPS International Conference (Cat. No. 01TH8569).
[12] D. Dasgupta,et al. Mobile security agents for network traffic analysis , 2001, Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01.
[13] Yun-Tao Zhang,et al. A fuzzy comprehensive evaluation based distributed intrusion detection , 2002, Proceedings. International Conference on Machine Learning and Cybernetics.
[14] Sung-Bae Cho,et al. Incorporating soft computing techniques into a probabilistic intrusion detection system , 2002, IEEE Trans. Syst. Man Cybern. Part C.
[15] Ingoo Han,et al. The neural network models for IDS based on the asymmetric costs of false negative errors and false positive errors , 2003, Expert Syst. Appl..
[16] M. Gordeev. Intrusion Detection: Techniques and Approaches , 2003 .
[17] Rebecca Gurley Bace,et al. Intrusion Detection , 2018, Encyclopedia of Social Network Analysis and Mining. 2nd Ed..