A Review: AIS Based Intrusion Detection System
暂无分享,去创建一个
[1] Jiang Rong,et al. An Anomaly Detection System Based on Dendritic Cell Algorithm , 2009, 2009 Third International Conference on Genetic and Evolutionary Computing.
[2] Salvatore J. Stolfo,et al. Using artificial anomalies to detect unknown and known network intrusions , 2003, Knowledge and Information Systems.
[3] Chung-Ming Ou,et al. Intrusion detection systems adapted from agent-based artificial immune systems , 2011, 2011 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE 2011).
[4] Baoyi Wang,et al. A New Intrusion Detection Method Based on Artificial Immune System , 2007, 2007 IFIP International Conference on Network and Parallel Computing Workshops (NPC 2007).
[5] Lei Deng,et al. Research on Immune Based Adaptive Intrusion Detection System Model , 2009, 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing.
[6] Manas Ranjan Patra,et al. NETWORK INTRUSION DETECTION USING NAÏVE BAYES , 2007 .
[7] Jianyong Liu,et al. Intrusion Detection Based on Immune Dynamical Matching Algorithm , 2010, 2010 International Conference on E-Business and E-Government.
[8] Zhong-Yang Xiong,et al. A Novel Method of Intrusion Detection Based on Artificial Immune System , 2006, 2006 International Conference on Machine Learning and Cybernetics.
[9] Irina Tudor,et al. Analyzing Information Security Issues Using Data Mining Techniques , 2008 .
[10] S. Al-Sharafat,et al. Adaptive Framework for Network Intrusion Detection by Using Genetic-Based Machine Learning Algorithm , 2009 .
[11] Gürsel Serpen,et al. Application of Machine Learning Algorithms to KDD Intrusion Detection Dataset within Misuse Detection Context , 2003, MLMTA.
[12] Luo Wanbo,et al. Intrusion Response Model Based on AIS , 2010, 2010 International Forum on Information Technology and Applications.
[13] Yan Ma,et al. Real-time feature selection in traffic classification , 2008 .
[14] Mohammad Zulkernine,et al. A hybrid network intrusion detection technique using random forests , 2006, First International Conference on Availability, Reliability and Security (ARES'06).
[15] Li Zhi-tang,et al. A novel fuzzy anomaly detection algorithm based on artificial immune system , 2005, Eighth International Conference on High-Performance Computing in Asia-Pacific Region (HPCASIA'05).