The affect of fuzzification on neural networks intrusion detection system
暂无分享,去创建一个
[1] Ray-I Chang,et al. INTRUSION DETECTION BY BACKPROPAGATION NEURAL NETWORKS WITH SAMPLE-QUERY AND ATTRIBUTE-QUERY , 2007 .
[2] Saadat Malik. Network Security Principles and Practices , 2002 .
[3] F. Martin McNeill,et al. Fuzzy Logic: A Practical Approach , 1994 .
[4] Los Angeles,et al. Doctor of Philosophy in Computer Science , 2007 .
[5] Robert J. Boncella,et al. Fuzzy Logic: An Introduction , 1995 .
[6] Todd L. Heberlein,et al. Network intrusion detection , 1994, IEEE Network.
[7] Phillip A. Porras,et al. STAT -- A State Transition Analysis Tool For Intrusion Detection , 1993 .
[8] Veselina G. Jecheva,et al. Learning Problem and BCJR Decoding Algorithm in Anomaly-based Intrusion Detection Systems , 2007, J. Softw..
[9] Dorothy E. Denning,et al. An Intrusion-Detection Model , 1986, 1986 IEEE Symposium on Security and Privacy.
[10] Earl Cox,et al. The fuzzy systems handbook , 1994 .
[11] Sandeep Kumar,et al. Classification and detection of computer intrusions , 1996 .
[12] Jonatan Gómez,et al. Evolving Fuzzy Classifiers for Intrusion Detection , 2002 .
[13] Salvatore J. Stolfo,et al. Cost-based modeling for fraud and intrusion detection: results from the JAM project , 2000, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.
[14] Ajith Abraham,et al. Feature deduction and ensemble design of intrusion detection systems , 2005, Comput. Secur..