Computer System Security Threat Evaluation Based Upon Artificial Immunity Model and Fuzzy Logic
暂无分享,去创建一个
[1] Dorothy E. Denning,et al. An Intrusion-Detection Model , 1986, 1986 IEEE Symposium on Security and Privacy.
[2] R. Power. CSI/FBI computer crime and security survey , 2001 .
[3] Stephanie Forrest,et al. Infect Recognize Destroy , 1996 .
[4] Carla E. Brodley,et al. Temporal sequence learning and data reduction for anomaly detection , 1998, CCS '98.
[5] A. Karr,et al. Computer Intrusion: Detecting Masquerades , 2001 .
[6] Hilary H. Hosmer,et al. Security is fuzzy!: applying the fuzzy logic paradigm to the multipolicy paradigm , 1993, NSPW '92-93.
[7] S. V. Raghavan,et al. Intrusion detection through learning behavior model , 2001, Comput. Commun..
[8] Risto Miikkulainen,et al. Intrusion Detection with Neural Networks , 1997, NIPS.
[9] Roy A. Maxion,et al. Masquerade detection using truncated command lines , 2002, Proceedings International Conference on Dependable Systems and Networks.
[10] Carla E. Brodley,et al. Machine learning techniques for the computer security domain of anomaly detection , 2000 .
[11] Stephanie Forrest,et al. Principles of a computer immune system , 1998, NSPW '97.