Evolutive Modeling of TCP/IP Network Traffic for Intrusion Detection
暂无分享,去创建一个
[1] Terran Lane,et al. An Application of Machine Learning to Anomaly Detection , 1999 .
[2] J. Ross Quinlan,et al. C4.5: Programs for Machine Learning , 1992 .
[3] Carla E. Brodley,et al. Approaches to Online Learning and Concept Drift for User Identification in Computer Security , 1998, KDD.
[4] Salvatore J. Stolfo,et al. Mining in a data-flow environment: experience in network intrusion detection , 1999, KDD '99.
[5] Filippo Neri,et al. Search-Intensive Concept Induction , 1995, Evolutionary Computation.
[6] David E. Goldberg,et al. Genetic Algorithms in Search Optimization and Machine Learning , 1988 .
[7] John R. Anderson,et al. MACHINE LEARNING An Artificial Intelligence Approach , 2009 .
[8] Filippo Neri,et al. Exploring the Power of Genetic Search in Learning Symbolic Classifiers , 1996, IEEE Trans. Pattern Anal. Mach. Intell..
[9] William W. Cohen. Fast Effective Rule Induction , 1995, ICML.
[10] Dorothy E. Denning,et al. An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.
[11] Robert K. Cunningham,et al. Results of the DARPA 1998 Offline Intrusion Detection Evaluation , 1999, Recent Advances in Intrusion Detection.
[12] Ryszard S. Michalski,et al. A Theory and Methodology of Inductive Learning , 1983, Artificial Intelligence.
[13] Michael Schatz,et al. Learning Program Behavior Profiles for Intrusion Detection , 1999, Workshop on Intrusion Detection and Network Monitoring.