ARTIFICIAL INTELLIGENCE APPROACHES FOR INTRUSION DETECTION
暂无分享,去创建一个
[1] Ivica Kostanic,et al. Principles of Neurocomputing for Science and Engineering , 2000 .
[2] Alex Aussem,et al. Queueing network modelling with distributed neural networks for service quality estimation in B-ISDN networks , 2000, Proceedings of the IEEE-INNS-ENNS International Joint Conference on Neural Networks. IJCNN 2000. Neural Computing: New Challenges and Perspectives for the New Millennium.
[3] Richard O. Duda,et al. Pattern classification and scene analysis , 1974, A Wiley-Interscience publication.
[4] Gürsel Serpen,et al. Application of Machine Learning Algorithms to KDD Intrusion Detection Dataset within Misuse Detection Context , 2003, MLMTA.
[5] Robert P. W. Duin,et al. Novelty Detection Using Self-Organizing Maps , 1997, ICONIP.
[6] Dit-Yan Yeung,et al. Parzen-window network intrusion detectors , 2002, Object recognition supported by user interaction for service robots.
[7] James Cannady,et al. Artificial Neural Networks for Misuse Detection , 1998 .
[8] Ramesh K. Agarwal,et al. PNrule : A New Framework for Learning Classifier Models in Data Mining ( A Cast-Study in Network Intrusion Detection ) Technical Report , 2004 .
[9] P LippmannRichard,et al. Improving intrusion detection performance using keyword selection and neural networks , 2000 .
[10] A.N. Zincir-Heywood,et al. On the capability of an SOM based intrusion detection system , 2003, Proceedings of the International Joint Conference on Neural Networks, 2003..
[11] Yuchun Lee,et al. Classifiers : adaptive modules in pattern recognition systems , 1989 .
[12] Dominique Brodbeck,et al. A Visual Approach for Monitoring Logs , 1998, LISA.
[13] Bruce G. Batchelor,et al. Pattern Recognition: Ideas in Practice , 1978 .
[14] Vipin Kumar,et al. Finding Clusters of Different Sizes, Shapes, and Densities in Noisy, High Dimensional Data , 2003, SDM.
[15] Vincent Kanade,et al. Clustering Algorithms , 2021, Wireless RF Energy Transfer in the Massive IoT Era.
[16] Dmitry V. Novikov. Neural networks to intrusion detection , 2005 .
[17] Leon Reznik,et al. Anomaly Detection Based Intrusion Detection , 2006, Third International Conference on Information Technology: New Generations (ITNG'06).
[18] Itzhak Levin,et al. KDD-99 classifier learning contest LLSoft's results overview , 2000, SKDD.
[19] Michael Schatz,et al. Learning Program Behavior Profiles for Intrusion Detection , 1999, Workshop on Intrusion Detection and Network Monitoring.
[20] Stephen Grossberg,et al. Fuzzy ARTMAP: A neural network architecture for incremental supervised learning of analog multidimensional maps , 1992, IEEE Trans. Neural Networks.
[21] Charles Elkan,et al. Results of the KDD'99 classifier learning , 2000, SKDD.
[22] P. Werbos,et al. Beyond Regression : "New Tools for Prediction and Analysis in the Behavioral Sciences , 1974 .
[23] Robert K. Cunningham,et al. Improving Intrusion Detection Performance using Keyword Selection and Neural Networks , 2000, Recent Advances in Intrusion Detection.
[24] Boleslaw K. Szymanski,et al. NETWORK-BASED INTRUSION DETECTION USING NEURAL NETWORKS , 2002 .