A cooperative intrusion detection model based on granular computing
暂无分享,去创建一个
[1] MengChu Zhou,et al. M-M Role-Transfer Problems and Their Solutions , 2009, IEEE Trans. Syst. Man Cybern. Part A.
[2] Bo Zhang,et al. The Quotient Space Theory of Problem Solving , 2003, Fundam. Informaticae.
[3] Yiyu Yao,et al. Granular computing: Past, present and future , 2008, 2008 IEEE International Conference on Granular Computing.
[4] Jeffrey Posluns,et al. Snort 2.0 Intrusion Detection , 2003 .
[5] Hu Jun. An overview of granular computing , 2007 .
[6] Fan Shi-dong. The Calculation of Knowledge Granulation and Its Application , 2002 .
[7] Yao,et al. Three Perspectives of Granular Computing , 2006 .
[8] Vladimir Eidelman,et al. Cognitive Robotics and Multiagency in a Fuzzy Modeling Framework , 2009, Int. J. Agent Technol. Syst..
[9] Ana L. C. Bazzan,et al. Multi-Agent Systems for Traffic and Transportation Engineering , 2009 .
[10] Jaideep Chandrashekar,et al. When Gossip is Good: Distributed Probabilistic Inference for Detection of Slow Network Intrusions , 2006, AAAI.
[11] Yanqing Zhang,et al. Constructive granular systems with universal approximation and fast knowledge discovery , 2005, IEEE Transactions on Fuzzy Systems.
[12] Kenneth Mark Bryden,et al. Initial Formulation of an Optimization Method Based on Stigmergic Construction , 2011, Int. J. Agent Technol. Syst..
[13] Liu Qing. Granules and Applications of Granular Computing in Logical Reasoning , 2004 .
[14] Huang,et al. A Granular Computing Model Based on Tolerance relation , 2005 .
[15] Yiyu Yao,et al. A Partition Model of Granular Computing , 2004, Trans. Rough Sets.
[16] Christopher Leckie,et al. Decentralized multi-dimensional alert correlation for collaborative intrusion detection , 2009, J. Netw. Comput. Appl..
[17] Eugene H. Spafford,et al. Intrusion detection using autonomous agents , 2000, Comput. Networks.
[18] Muaz A. Niazi,et al. A Novel Formal Agent-Based Simulation Modeling Framework of an AIDS Complex Adaptive System , 2017, Int. J. Agent Technol. Syst..
[19] Naiqi Wu,et al. Cooperative Intrusion Detection Model Based on State Transition Analysis , 2007, CSCWD.
[20] G. G. Stokes. "J." , 1890, The New Yale Book of Quotations.
[21] Christopher Leckie,et al. A survey of coordinated attacks and collaborative intrusion detection , 2010, Comput. Secur..
[22] Steven Linscott,et al. Maximum Security , 1994 .
[23] Andrzej Bargiela,et al. The roots of granular computing , 2006, 2006 IEEE International Conference on Granular Computing.
[24] Bu Dong. Principle of Granularity in Clustering and Classification , 2002 .
[25] Yiyu Yao,et al. Granular Computing: Past, Present, and Future , 2008, Rough Sets and Knowledge Technology.
[26] Eugene H. Spafford,et al. An architecture for intrusion detection using autonomous agents , 1998, Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217).
[27] Miao Duoqian,et al. Application of Granular Computing to Artificial Neural Network , 2006 .
[28] Han Xie. Anomaly intrusion detection based on quotient space granularity clustering , 2010 .
[29] Andrzej Skowron,et al. Information granules: Towards foundations of granular computing , 2001 .
[30] MengChu Zhou,et al. Efficient Role Transfer Based on Kuhn–Munkres Algorithm , 2012, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.
[31] Wu Yu. Granular Computing in Incomplete Information Systems , 2005 .
[32] Ronald R. Yager,et al. Some learning paradigms for granular computing , 2006, 2006 IEEE International Conference on Granular Computing.
[33] Liu Qing. G-Logic and Its Resolution Reasoning , 2004 .
[34] Hongle Du,et al. A Cooperative Network Intrusion detection Based on Fuzzy SVMs , 2010, J. Networks.
[35] MengChu Zhou,et al. Role Transfer Problems and their Solutions , 2022 .
[36] MengChu Zhou,et al. Role-based collaboration and its kernel mechanisms , 2006, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).
[37] K. N. King. 2006 IEEE International Conference on Granular Computing , 2006, IEEE Comput. Intell. Mag..
[38] Yiyu Yao,et al. Granular computing for data mining , 2006, SPIE Defense + Commercial Sensing.
[39] Abraham Kandel,et al. Granular neural networks for numerical-linguistic data fusion and knowledge discovery , 2000, IEEE Trans. Neural Networks Learn. Syst..