A brief introduction to intrusion detection system
暂无分享,去创建一个
[1] Dorothy E. Denning,et al. An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.
[2] Ray Hunt,et al. Intrusion detection techniques and approaches , 2002, Comput. Commun..
[3] J. Ross Quinlan,et al. Induction of Decision Trees , 1986, Machine Learning.
[4] Christopher Krügel,et al. Using Decision Trees to Improve Signature-Based Intrusion Detection , 2003, RAID.
[5] Lucas M. Venter,et al. A comparison of Intrusion Detection systems , 2001, Comput. Secur..
[6] Joshua Ojo Nehinbe,et al. Automated Method for Reducing False Positives , 2010, 2010 International Conference on Intelligent Systems, Modelling and Simulation.
[7] Safaa O. Al-Mamory,et al. A survey on IDS alerts processing techniques , 2007 .
[8] S. V. Raghavan,et al. Intrusion detection through learning behavior model , 2001, Comput. Commun..
[9] William J. Buchanan,et al. An agent-based Bayesian forecasting model for enhanced network security , 2001, Proceedings. Eighth Annual IEEE International Conference and Workshop On the Engineering of Computer-Based Systems-ECBS 2001.
[10] Giovanni Vigna,et al. Intrusion detection: a brief history and overview , 2002 .
[11] Ajith Abraham,et al. Modeling intrusion detection system using hybrid intelligent systems , 2007, J. Netw. Comput. Appl..
[12] Elsayed Radwan,et al. Intrusion Detection Using Rough Set Parallel Genetic Programming Based Hybrid Model , 2009 .
[13] A. B. Mohamed,et al. Alert Correlation Using a Novel Clustering Approach , 2012, 2012 International Conference on Communication Systems and Network Technologies.
[14] Wei-Yang Lin,et al. Intrusion detection by machine learning: A review , 2009, Expert Syst. Appl..
[15] Gongzhu Hu,et al. Design and Performance Evaluation of a Machine Learning-Based Method for Intrusion Detection , 2010 .
[16] Wencai Du,et al. Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing 2010 , 2014 .
[17] David Taniar,et al. Computational Science and Its Applications - ICCSA 2006, International Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part I , 2006, ICCSA.
[18] Dewan Md. Farid,et al. Anomaly Network Intrusion Detection Based on Improved Self Adaptive Bayesian Algorithm , 2010, J. Comput..
[19] Norbik Bashah Idris,et al. Improved Intrusion Detection System Using Fuzzy Logic for Detecting Anamoly and Misuse Type of Attacks , 2009, 2009 International Conference of Soft Computing and Pattern Recognition.
[20] Ali A. Ghorbani,et al. Research on Intrusion Detection and Response: A Survey , 2005, Int. J. Netw. Secur..
[21] A. Kannan,et al. A Neuro-genetic ensemble Short Term Forecasting Framework for Anomaly Intrusion Prediction , 2006, 2006 International Conference on Advanced Computing and Communications.
[22] Dongho Won,et al. Design of an On-Line Intrusion Forecast System with a Weather Forecasting Model , 2006, ICCSA.