Soft Computing Models for Network Intrusion Detection Systems
暂无分享,去创建一个
[1] Sugata Sanyal,et al. Adaptive neuro-fuzzy intrusion detection systems , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..
[2] William W. Cohen. Learning Trees and Rules with Set-Valued Features , 1996, AAAI/IAAI, Vol. 1.
[3] Ajith Abraham,et al. Intrusion Detection Using Ensemble of Soft Computing Paradigms , 2003 .
[4] Sushil Jajodia,et al. ADAM: a testbed for exploring the use of data mining in intrusion detection , 2001, SGMD.
[5] Lotfi A. Zadeh,et al. Roles of Soft Computing and Fuzzy Logic in the Conception, Design and Deployment of Information/Intelligent Systems , 1998 .
[6] Susan M. Bridges,et al. Mining fuzzy association rules and fuzzy frequency episodes for intrusion detection , 2000, Int. J. Intell. Syst..
[7] Vladimir N. Vapnik,et al. The Nature of Statistical Learning Theory , 2000, Statistics for Engineering and Information Science.
[8] Susan M. Bridges,et al. Mining fuzzy association rules and fuzzy frequency episodes for intrusion detection , 2000 .
[9] A. Abraham,et al. Intrusion Detection Systems Using Decision Trees and Support Vector Machines , 2004 .
[10] Salvatore J. Stolfo,et al. A data mining framework for building intrusion detection models , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).
[11] Rita C. Summers. Secure Computing: Threats and Safeguards , 1996 .
[12] Wolfgang Banzhaf,et al. A comparison of linear genetic programming and neural networks in medical data mining , 2001, IEEE Trans. Evol. Comput..
[13] Dorothy E. Denning,et al. An Intrusion-Detection Model , 1986, 1986 IEEE Symposium on Security and Privacy.