The Use of Intelligent Algorithms to Detect Attacks In Intrusion Detection System
暂无分享,去创建一个
[1] M. V. Velzen,et al. Self-organizing maps , 2007 .
[2] Dorothy E. Denning,et al. An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.
[3] Steven W. Smith,et al. The Scientist and Engineer's Guide to Digital Signal Processing , 1997 .
[4] Dieter Gollmann,et al. Computer Security , 1979, Lecture Notes in Computer Science.
[5] Dominic Palmer-Brown,et al. Continuous Reinforced Snap-Drift Learning in a Neural Architecture for Proxylet Selection in Active Computer Networks , 2005 .
[6] Richard Lippmann,et al. Analysis and Results of the 1999 DARPA Off-Line Intrusion Detection Evaluation , 2000, Recent Advances in Intrusion Detection.
[7] J.D.S. da Silva,et al. A neural network application for attack detection in computer networks , 2004, 2004 IEEE International Joint Conference on Neural Networks (IEEE Cat. No.04CH37541).
[8] Martin T. Hagan,et al. Neural network design , 1995 .
[9] Fred Cohen,et al. Computer viruses—theory and experiments , 1990 .
[10] Peter L ichodzijewski. Dynamic Intrusion Detection Using Self-Organizing Maps , 2002 .