Optimization of Dynamic Programming to the Multimedia Packets Processing Method for Network Intrusion Detection System

[1]  Liang He,et al.  An Improved Intrusion Detection based on Neural Network and Fuzzy Algorithm , 2014, J. Networks.

[2]  Liang Hu,et al.  Intrusion Classifier based on Multiple Attribute Selection Algorithms , 2013, J. Comput..

[3]  Philip K. Chan,et al.  An Analysis of the 1999 DARPA/Lincoln Laboratory Evaluation Data for Network Anomaly Detection , 2003, RAID.

[4]  M. Arun,et al.  Functional verification of signature detection architectures for high speed network applications , 2012, Int. J. Autom. Comput..

[5]  K. Sravani,et al.  Comparative Study of Machine Learning Algorithm for Intrusion Detection System , 2013, FICTA.

[6]  Liu Ming-zhe Network Intrusion Detection Based on CPSO-LSSVM , 2013 .

[7]  Wang Yongsheng,et al.  Intrusion detection algorithm based on fuzzy evaluation and clustering analysis , 2012 .

[8]  Yan Hongwen Research on improved BMH single-pattern matching algorithm based on Snort , 2012 .

[9]  Bo Liu,et al.  Intrusion Detection Scheme based on IPSO-RBF , 2013, J. Networks.

[10]  Jiang She An Improved Ant Colony Clustering Method for Intrusion Detection , 2013 .

[11]  Khalid Shahbar,et al.  (WHASG) Automatic SNORT Signatures Generation by using Honeypot , 2013, J. Comput..

[12]  Jian Dai,et al.  The Discretization Algorithm for Rough Data and Its Application to Intrusion Detection , 2014, J. Networks.

[13]  Liu Yu Intrusion detection model of abnormal event fusion based on gray correlation , 2013 .

[14]  Qingtao Wu,et al.  Intrusion Feature Selection Algorithm Based on Particle Swarm Optimization , 2014 .

[15]  Song Tian,et al.  Memory Efficient Algorithm and Architecture for Multi-Pattern Matching , 2013 .