Improving Intrusion Detection Performance using Keyword Selection and Neural Networks
暂无分享,去创建一个
[1] Robert K. Cunningham,et al. Evaluating Intrusion Detection Systems Without Attacking Your Friends: The 1998 DARPA Intrusion Detection Evaluation , 1999 .
[2] E. Amoroso. Intrusion Detection , 1999 .
[3] R.K. Cunningham,et al. Evaluating intrusion detection systems: the 1998 DARPA off-line intrusion detection evaluation , 2000, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.
[4] Richard Lippmann,et al. The 1999 DARPA off-line intrusion detection evaluation , 2000, Comput. Networks.
[5] Salvatore J. Stolfo,et al. Mining in a data-flow environment: experience in network intrusion detection , 1999, KDD '99.
[6] William L. Fithen,et al. State of the Practice of Intrusion Detection Technologies , 2000 .
[7] Richard P. Lippmann,et al. LNKnet: Neural Network, Machine-Learning, and Statistical Software for Pattern Classification , 1993 .
[8] BishopMatt,et al. The threat from the net , 1997 .
[9] Peter G. Neumann,et al. Experience with EMERALD to Date , 1999, Workshop on Intrusion Detection and Network Monitoring.
[10] Steven Cheung,et al. The threat from the net [Internet security] , 1997 .
[11] John McHugh,et al. Defending Yourself: The Role of Intrusion Detection Systems , 2000, IEEE Software.
[12] Thomas Henry Ptacek,et al. Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection , 1998 .