Intelligent Cyber Defense System
暂无分享,去创建一个
[1] Ali A. Ghorbani,et al. A detailed analysis of the KDD CUP 99 data set , 2009, 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications.
[2] E. Benjamini,et al. Immunology: A Short Course , 1988 .
[3] S. Srinoy,et al. Anomaly-Based Intrusion Detection using Fuzzy Rough Clustering , 2006, 2006 International Conference on Hybrid Information Technology.
[4] Julie A. Dickerson,et al. Fuzzy intrusion detection , 2001, Proceedings Joint 9th IFSA World Congress and 20th NAFIPS International Conference (Cat. No. 01TH8569).
[5] James Cannady. Applying CMAC-based online learning to intrusion detection , 2000, Proceedings of the IEEE-INNS-ENNS International Joint Conference on Neural Networks. IJCNN 2000. Neural Computing: New Challenges and Perspectives for the New Millennium.
[6] Jerne Nk. Towards a network theory of the immune system. , 1974 .
[7] Gregg H. Gunsch,et al. An artificial immune system architecture for computer security applications , 2002, IEEE Trans. Evol. Comput..
[8] Kimmo Hätönen,et al. A computer host-based user anomaly detection system using the self-organizing map , 2000, Proceedings of the IEEE-INNS-ENNS International Joint Conference on Neural Networks. IJCNN 2000. Neural Computing: New Challenges and Perspectives for the New Millennium.
[9] Timo Horeis. Intrusion Detection with Neural Networks – Combination of Self-Organizing Maps and Radial Basis Function Networks for Human Expert Integration , .
[10] Fabio A. González,et al. The Effect of Binary Matching Rules in Negative Selection , 2003, GECCO.
[11] Stephanie Forrest,et al. Coverage and Generalization in an Artificial Immune System , 2002, GECCO.
[12] Claudia Eckert,et al. Is negative selection appropriate for anomaly detection? , 2005, GECCO '05.
[13] Claudia Eckert,et al. An Investigation of R-Chunk Detector Generation on Higher Alphabets , 2004, GECCO.
[14] Julie Greensmith,et al. Immune System Approaches to Intrusion Detection - A Review , 2004, ICARIS.
[15] Taia T. Wang,et al. Immunity by Design. , 2018, Cell host & microbe.
[16] Vladimir A. Golovko,et al. Intelligent system for detection of networking intrusion , 2011, Proceedings of the 6th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems.
[17] Francisco Ibarra,et al. Application of Neural Networks in Network Control and Information Security , 2006, ISNN.
[18] K. P. Murphy,et al. Janeway's immunobiology , 2007 .
[19] Hai Jin,et al. Network-Based Anomaly Detection Using an Elman Network , 2005, ICCNMC.
[20] F. Burnet. The clonal selection theory of acquired immunity , 1959 .
[21] Hervé Debar,et al. A neural network component for an intrusion detection system , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.
[22] L. Ibrahim. ANOMALY NETWORK INTRUSION DETECTION SYSTEM BASED ON DISTRIBUTED TIME-DELAY NEURAL NETWORK (DTDNN) , 2010 .
[23] Peter J. Bentley,et al. Artificial Immune Systems , 2004, Lecture Notes in Computer Science.
[24] Vladimir A. Golovko,et al. Development of neural network immune detectors for computer attacks recognition and classification , 2013, 2013 IEEE 7th International Conference on Intelligent Data Acquisition and Advanced Computing Systems (IDAACS).
[25] Julie Greensmith,et al. The Deterministic Dendritic Cell Algorithm , 2008, ICARIS.
[26] R. Gershon,et al. "Clonal selection and after," and after. , 1979, The New England journal of medicine.
[27] Prasert Kanthamanon,et al. Hybrid Neural Networks for Intrusion Detection System , 2002 .
[28] Sang-Kyoon Kim,et al. An intrusion detection system using principal component analysis and time delay neural network , 2005, Proceedings of 7th International Workshop on Enterprise networking and Computing in Healthcare Industry, 2005. HEALTHCOM 2005..
[29] Francisco Maciá Pérez,et al. Intrusion Detection Method Using Neural Networks Based on the Reduction of Characteristics , 2009, IWANN.
[30] Chunlin Zhang,et al. Comparison of BPL and RBF Network in Intrusion Detection System , 2003, RSFDGrC.