Evolutionary Computation in Intelligent Network Management
暂无分享,去创建一个
[1] Xiaozhe Wang,et al. Soft Computing Paradigms for Web Access Pattern Analysis , 2002, FSKD.
[2] Dorothy E. Denning,et al. An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.
[3] Francisco Herrera,et al. Genetic Fuzzy Systems - Evolutionary Tuning and Learning of Fuzzy Knowledge Bases , 2002, Advances in Fuzzy Systems - Applications and Theory.
[4] James C. Bezdek,et al. Pattern Recognition with Fuzzy Objective Function Algorithms , 1981, Advanced Applications in Pattern Recognition.
[5] Wolfgang Banzhaf,et al. A comparison of linear genetic programming and neural networks in medical data mining , 2001, IEEE Trans. Evol. Comput..
[6] Rita C. Summers. Secure Computing: Threats and Safeguards , 1996 .
[7] Ajith Abraham,et al. Web usage mining using artificial ant colony clustering and linear genetic programming , 2003, The 2003 Congress on Evolutionary Computation, 2003. CEC '03..
[8] Ajith Abraham. i-Miner: a Web usage mining framework using hierarchical intelligent systems , 2003, The 12th IEEE International Conference on Fuzzy Systems, 2003. FUZZ '03..
[9] Salvatore J. Stolfo,et al. A data mining framework for building intrusion detection models , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).
[10] Susan M. Bridges,et al. Mining fuzzy association rules and fuzzy frequency episodes for intrusion detection , 2000, Int. J. Intell. Syst..
[11] Ajith Abraham,et al. Business Intelligence from Web Usage Mining , 2003, J. Inf. Knowl. Manag..
[12] James C. Bezdek,et al. Clustering with a genetically optimized approach , 1999, IEEE Trans. Evol. Comput..
[13] Vladimir N. Vapnik,et al. The Nature of Statistical Learning Theory , 2000, Statistics for Engineering and Information Science.
[14] William W. Cohen. Learning Trees and Rules with Set-Valued Features , 1996, AAAI/IAAI, Vol. 1.
[15] Ajith Abraham,et al. Intrusion Detection Using Ensemble of Soft Computing Paradigms , 2003 .
[16] Jaideep Srivastava,et al. Web usage mining: discovery and applications of usage patterns from Web data , 2000, SKDD.
[17] Sushil Jajodia,et al. ADAM: a testbed for exploring the use of data mining in intrusion detection , 2001, SGMD.
[18] Ajith Abraham. EvoNF: a framework for optimization of fuzzy inference systems using neural network learning and evolutionary computation , 2002, Proceedings of the IEEE Internatinal Symposium on Intelligent Control.