Network Intrusion Detection System using Fuzzy Logic
暂无分享,去创建一个
[1] Marcos M. Campos,et al. Creation and deployment of data mining-based intrusion detection systems in Oracle Database l0g , 2005, Fourth International Conference on Machine Learning and Applications (ICMLA'05).
[2] Kuldip K. Paliwal,et al. Intrusion detection using text processing techniques with a kernel based similarity measure , 2007, Comput. Secur..
[3] Ali A. Ghorbani,et al. A detailed analysis of the KDD CUP 99 data set , 2009, 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications.
[4] Qiang Wang,et al. A clustering algorithm for intrusion detection , 2005, SPIE Defense + Commercial Sensing.
[5] Jian Pei,et al. Mining Frequent Patterns without Candidate Generation: A Frequent-Pattern Tree Approach , 2006, Sixth IEEE International Conference on Data Mining - Workshops (ICDMW'06).
[6] Shi-Jinn Horng,et al. A novel intrusion detection system based on hierarchical clustering and support vector machines , 2011, Expert Syst. Appl..
[7] Reuven R. Levary,et al. An adaptive expert system approach for intrusion detection , 2006, Int. J. Secur. Networks.
[8] Lotfi A. Zadeh,et al. Fuzzy Sets , 1996, Inf. Control..
[9] Susan M. Bridges,et al. FUZZY DATA MINING AND GENETIC ALGORITHMS APPLIED TO INTRUSION DETECTION , 2002 .
[10] Susan M. Bridges,et al. Mining fuzzy association rules and fuzzy frequency episodes for intrusion detection , 2000 .
[11] Jingtao Yao,et al. A study on fuzzy intrusion detection , 2005, SPIE Defense + Commercial Sensing.
[12] James Cannady,et al. Artificial Neural Networks for Misuse Detection , 1998 .
[13] C. Lucas,et al. Intrusion detection using a fuzzy genetics-based learning algorithm , 2007, J. Netw. Comput. Appl..
[14] Mohammad Saniee Abadeh,et al. Computer Intrusion Detection Using an Iterative Fuzzy Rule Learning Approach , 2007, 2007 IEEE International Fuzzy Systems Conference.
[15] Dewan Md. Farid,et al. Anomaly Network Intrusion Detection Based on Improved Self Adaptive Bayesian Algorithm , 2010, J. Comput..
[16] I. Ramesh Babu. Intrusion Detection Using Data Mining Along Fuzzy Logic and Genetic Algorithms , 2008 .
[17] Abdolreza Mirzaei,et al. Intrusion detection using fuzzy association rules , 2009, Appl. Soft Comput..
[18] Julie A. Dickerson,et al. Fuzzy intrusion detection , 2001, Proceedings Joint 9th IFSA World Congress and 20th NAFIPS International Conference (Cat. No. 01TH8569).
[19] Pakkurthi Srinivasu,et al. Approaches and Data Processing Techniques for Intrusion Detection Systems , 2009 .
[20] Gabriel Maciá-Fernández,et al. Anomaly-based network intrusion detection: Techniques, systems and challenges , 2009, Comput. Secur..
[21] R. G. M. Helali. Data Mining Based Network Intrusion Detection System: A Survey , 2008, TeNe.
[22] William L. Fithen,et al. State of the Practice of Intrusion Detection Technologies , 2000 .
[23] Huang Hao,et al. An Ensemble Approach to Intrusion Detection Based on Improved Multi-Objective Genetic Algorithm , 2007 .
[24] Alma Husagic Selman. Intrusion Detection System using Fuzzy Logic , 2013, SOCO 2013.
[25] Zhongzhi Shi,et al. Network Anomalous Intrusion Detection using Fuzzy-Bayes , 2006, Intelligent Information Processing.
[26] Siti Mariyam Shamsuddin,et al. RESEARCH ISSUES IN ADAPTIVE INTRUSION DETECTION , 2006 .
[27] Kenichi Yoshida,et al. Entropy based intrusion detection , 2003, 2003 IEEE Pacific Rim Conference on Communications Computers and Signal Processing (PACRIM 2003) (Cat. No.03CH37490).
[28] Norbik Bashah Idris,et al. Improved Intrusion Detection System Using Fuzzy Logic for Detecting Anamoly and Misuse Type of Attacks , 2009, 2009 International Conference of Soft Computing and Pattern Recognition.
[29] Venu Govindaraju,et al. Data mining for intrusion detection: techniques, applications and systems , 2004, Proceedings. 20th International Conference on Data Engineering.
[30] Eugene H. Spafford,et al. Defending a Computer System Using Autonomous Agents , 1995 .
[31] Francisco Herrera,et al. Ten years of genetic fuzzy systems: current framework and new trends , 2004, Fuzzy Sets Syst..
[32] Rebecca Gurley Bace,et al. Intrusion Detection , 2018, Encyclopedia of Social Network Analysis and Mining. 2nd Ed..
[33] Anna Sperotto,et al. Flow-based intrusion detection , 2011, 12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops.
[34] Salvatore J. Stolfo,et al. A data mining framework for building intrusion detection models , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).
[35] Tomasz Imielinski,et al. Mining association rules between sets of items in large databases , 1993, SIGMOD Conference.
[36] Nivedita Naidu,et al. An Effective Approach to Network Intrusion Detection System using Genetic Algorithm , 2010 .
[37] Taeshik Shon,et al. SVM Approach with a Genetic Algorithm for Network Intrusion Detection , 2005, ISCIS.