Autonomous rule creation for intrusion detection
暂无分享,去创建一个
[1] Dhruba Kumar Bhattacharyya,et al. Anomaly Detection Analysis of Intrusion Data Using Supervised & Unsupervised Approach , 2010, J. Convergence Inf. Technol..
[2] Milos Manic,et al. Neural Network based Intrusion Detection System for critical infrastructures , 2009, 2009 International Joint Conference on Neural Networks.
[3] Georges R. Harik,et al. Finding Multimodal Solutions Using Restricted Tournament Selection , 1995, ICGA.
[4] Hao Wang,et al. NetSpy: Automatic Generation of Spyware Signatures for NIDS , 2006, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06).
[5] Jim Alves-Foss,et al. An empirical analysis of NATE: Network Analysis of Anomalous Traffic Events , 2002, NSPW '02.
[6] Anup Goyal,et al. GA-NIDS : A Genetic Algorithm based Network Intrusion Detection System , 2007 .
[7] Milos Manic,et al. Computationally efficient Neural Network Intrusion Security Awareness , 2009, 2009 2nd International Symposium on Resilient Control Systems.
[8] Sara Matzner,et al. An application of machine learning to network intrusion detection , 1999, Proceedings 15th Annual Computer Security Applications Conference (ACSAC'99).
[9] Martin Roesch,et al. Snort - Lightweight Intrusion Detection for Networks , 1999 .
[10] Kalyanmoy Deb,et al. Comparison of multi-modal optimization algorithms based on evolutionary algorithms , 2006, GECCO.