A neural network based distributed intrusion detection system on cloud platform
暂无分享,去创建一个
Lingfeng Wang | Zhe Li | Weiqing Sun | Weiqing Sun | Lingfeng Wang | Zhe Li
[1] Gyanendra Kumar Goyal,et al. Radial Basis (Exact Fit) Artificial Neural Network Technique for Estimating Shelf Life of Burfi , 2012, CSA 2012.
[2] Dong Xiang,et al. Information-theoretic measures for anomaly detection , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[3] Michael Negnevitsky,et al. Artificial Intelligence: A Guide to Intelligent Systems Third Edition , 2011 .
[4] Hari Om,et al. A hybrid system for reducing the false alarm rate of anomaly intrusion detection system , 2012, 2012 1st International Conference on Recent Advances in Information Technology (RAIT).
[5] Madhumita Chatterjee,et al. An Adaptive Distributed Intrusion Detection System for Cloud Computing Framework , 2012, SNDS.
[6] Yinhui Li,et al. An efficient intrusion detection system based on support vector machines and gradually feature removal method , 2012, Expert Syst. Appl..
[7] Jeng-Shyang Pan,et al. Statistical Based Waveform Classification for Cloud Intrusion Detection , 2012, 2012 International Conference on Computing, Measurement, Control and Sensor Network.
[8] Michael Negnevitsky,et al. Artificial Intelligence: A Guide to Intelligent Systems , 2001 .
[9] Weiqing Sun,et al. Collabra: A Xen Hypervisor Based Collaborative Intrusion Detection System , 2011, 2011 Eighth International Conference on Information Technology: New Generations.
[10] Avinash Agarwal,et al. Radial Basis Function Artificial Neural Network: Spread Selection , 2012 .
[11] Muttukrishnan Rajarajan,et al. Integrating Signature Apriori based Network Intrusion Detection System (NIDS) in Cloud Computing , 2012 .
[12] Randy H. Katz,et al. A view of cloud computing , 2010, CACM.
[13] Alok Aggarwal,et al. Composing Signatures for Misuse Intrusion Detection System Using Genetic Algorithm in an Offline Environment , 2012, ACITY.
[14] Sadok Ben Yahia,et al. Towards a Multiagent-Based Distributed Intrusion Detection System Using Data Mining Approaches , 2011, ADMI.
[15] Anup K. Ghosh,et al. A Study in Using Neural Networks for Anomaly and Misuse Detection , 1999, USENIX Security Symposium.
[16] Eui-nam Huh,et al. A Collaborative Intrusion Detection System Framework for Cloud Computing , 2011, ICITCS.
[17] Md. Abu Naser Bikas,et al. An Implementation of Intrusion Detection System Using Genetic Algorithm , 2012, ArXiv.
[18] Kang-Hyun Jo,et al. An Efficient Method of Vehicle License Plate Recognition Based on Sliding Concentric Windows and Artificial Neural Network , 2012 .
[19] Fabio A. González,et al. An immunity-based technique to characterize intrusions in computer networks , 2002, IEEE Trans. Evol. Comput..
[20] Anjali Sardana,et al. A Hybrid Intrusion Detection Architecture for Defense against DDoS Attacks in Cloud Environment , 2012, IC3.
[21] Shahram Sarkani,et al. A network intrusion detection system based on a Hidden Naïve Bayes multiclass classifier , 2012, Expert Syst. Appl..
[22] Yanpei Chen,et al. What's New About Cloud Computing Security? , 2010 .
[23] Andrew H. Sung,et al. Intrusion detection using neural networks and support vector machines , 2002, Proceedings of the 2002 International Joint Conference on Neural Networks. IJCNN'02 (Cat. No.02CH37290).
[24] Rafael Timóteo de Sousa Júnior,et al. Building Scalable Distributed Intrusion Detection Systems Based on the MapReduce Framework , 2011 .
[25] Hassan Takabi,et al. DCDIDP: A distributed, collaborative, and data-driven intrusion detection and prevention framework for cloud computing environments , 2011, 7th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom).
[26] Yadong Gong,et al. A Survey of Cloud Computing , 2013 .
[27] Gao Wei,et al. Application of Genetic Neural Network on Lifeless-Repairable Spares Consumption Forecasting , 2012, 2012 International Conference on Computer Science and Service System.
[28] Shalini Bhatia,et al. Traffic Flow Control using Neural Network , 2012 .
[29] D. P. Gaikwad,et al. Anomaly Based Intrusion Detection System Using Artificial Neural Network and Fuzzy Clustering , 2012 .
[30] Balaraman Ravindran,et al. Adaptive network intrusion detection system using a hybrid approach , 2012, 2012 Fourth International Conference on Communication Systems and Networks (COMSNETS 2012).
[31] Xiaolin Li,et al. Minimizing Distribution Cost of Distributed Neural Networks in Wireless Sensor Networks , 2007, IEEE GLOBECOM 2007 - IEEE Global Telecommunications Conference.
[32] VARUN CHANDOLA,et al. Anomaly detection: A survey , 2009, CSUR.
[33] Vipin Kumar,et al. Introduction to Data Mining , 2022, Data Mining and Machine Learning Applications.
[34] Yuan Jing,et al. Prediction of coal calorific value based on the RBF neural network optimized by genetic algorithm , 2012, 2012 8th International Conference on Natural Computation.
[35] Takuya Suzuki,et al. Security Architectures for Cloud Computing , 2010 .
[36] V. Kotov,et al. A Survey of Modern Advances in Network Intrusion Detection , 2011 .
[37] Yi-Mao Hsiao,et al. High-throughput intrusion detection system with parallel pattern matching , 2012, IEICE Electron. Express.
[38] Sugata Sanyal,et al. A New Trusted and Collaborative Agent Based Approach for Ensuring Cloud Security , 2011, ArXiv.
[39] S Ramgovind,et al. The management of security in Cloud computing , 2010, 2010 Information Security for South Africa.
[40] Jimin Yu,et al. Rainfall time series forecasting based on Modular RBF Neural Network model coupled with SSA and PLS , 2012 .
[41] Carla E. Brodley,et al. Challenges and Opportunities in Applied Machine Learning , 2012, AI Mag..