Network intrusion detection system using genetic network programming with support vector machine
暂无分享,去创建一个
[1] Doo Heon Song,et al. A memory-based learning approach to reduce false alarms in intrusion detection , 2005, The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005..
[2] Cheng Xiang,et al. Design of Multiple-Level Hybrid Classifier for Intrusion Detection System , 2005, 2005 IEEE Workshop on Machine Learning for Signal Processing.
[3] Salvatore J. Stolfo,et al. Data Mining Approaches for Intrusion Detection , 1998, USENIX Security Symposium.
[4] Risto Vaarandi. Real-time classification of IDS alerts with data mining techniques , 2009, MILCOM 2009 - 2009 IEEE Military Communications Conference.
[5] Xinghuo Yu,et al. A simple and efficient hidden Markov model scheme for host-based anomaly intrusion detection , 2009, IEEE Network.
[6] Hayder Radha,et al. Joint network-host based malware detection using information-theoretic tools , 2010, Journal in Computer Virology.
[7] Zhilin Feng,et al. Research and Design for Intrusion Detection System with Hybrid Detector and Apriori Algorithm , 2010, 2010 2nd International Conference on E-business and Information System Security.
[8] WenJie Tian,et al. A new network intrusion detection identification model research , 2010, 2010 2nd International Asia Conference on Informatics in Control, Automation and Robotics (CAR 2010).
[9] Cheng Xiang,et al. Design of Multiple-Level Hybrid Classifier for Intrusion Detection System , 2005 .
[10] Shingo Mabu,et al. An Intrusion-Detection Model Based on Fuzzy Class-Association-Rule Mining Using Genetic Network Programming , 2011, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).
[11] N.V.S. Reddy,et al. A Two-stage Hybrid Model for Intrusion Detection , 2006, 2006 International Conference on Advanced Computing and Communications.
[12] Wei Xu,et al. Incremental SVM based on reserved set for network intrusion detection , 2011, Expert Syst. Appl..
[13] Mrudula Gudadhe,et al. A new data mining based network Intrusion Detection model , 2010, 2010 International Conference on Computer and Communication Technology (ICCCT).
[14] P. Thangaraj,et al. Implementation of two class classifiers for hybrid intrusion detection , 2010, 2010 International Conference on Communication and Computational Intelligence (INCOCCI).
[15] S.F. Yusufovna,et al. Integrating Intrusion Detection System and Data Mining , 2008, 2008 International Symposium on Ubiquitous Multimedia Computing.
[16] Yi Hu,et al. A data mining approach for database intrusion detection , 2004, SAC '04.
[17] Jiawei Han,et al. Data Mining: Concepts and Techniques , 2000 .
[18] R. M. Chandrasekaran,et al. Intrusion detection using neural based hybrid classification methods , 2011, Comput. Networks.
[19] Ying Chen,et al. Hybrid Intrusion Detection with Weighted Signature Generation over Anomalous Internet Episodes , 2007, IEEE Transactions on Dependable and Secure Computing.
[20] Adam Carlson,et al. Modeling network intrusion detection alerts for correlation , 2007, ACM Trans. Inf. Syst. Secur..
[21] A. Kannan,et al. An Intrusion Detection System Based on Multiple Level Hybrid Classifier using Enhanced C4.5 , 2008, 2008 International Conference on Signal Processing, Communications and Networking.
[22] Joohan Lee,et al. A dynamic data mining technique for intrusion detection systems , 2005, ACM Southeast Regional Conference.
[23] Fredrick Mtenzi,et al. Intrusion Detection Based on Data Mining , 2009, 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing.