Efficient Intrusion Detection Mechanism using FCRM and Neural Network
暂无分享,去创建一个
[1] Idris Bharanidharan Shanmugam,et al. Hybrid intelligent Intrusion Detection System , 2005 .
[2] Rachid Beghdad,et al. Critical study of neural networks in detecting intrusions , 2008, Comput. Secur..
[3] Rong-Jong Wai,et al. A supervisory fuzzy neural network control system for tracking periodic inputs , 1999, IEEE Trans. Fuzzy Syst..
[4] James C. Bezdek,et al. Fuzzy mathematics in pattern classification , 1973 .
[5] R.J. Hathaway,et al. Switching regression models and fuzzy clustering , 1993, IEEE Trans. Fuzzy Syst..
[6] Wolfgang Banzhaf,et al. The use of computational intelligence in intrusion detection systems: A review , 2010, Appl. Soft Comput..
[7] Jung-Min Park,et al. An overview of anomaly detection techniques: Existing solutions and latest technological trends , 2007, Comput. Networks.
[8] Wei Cong,et al. Anomaly intrusion detection based on PLS feature extraction and core vector machine , 2013, Knowl. Based Syst..
[9] Huwaida Tagelsir Elshoush,et al. Reducing false positives through fuzzy alert correlation in collaborative intelligent intrusion detection systems — A review , 2010, International Conference on Fuzzy Systems.
[10] Xiangji Huang,et al. Mining network data for intrusion detection through combining SVMs with ant colony networks , 2014, Future Gener. Comput. Syst..
[11] Sokratis K. Katsikas,et al. Using a Fuzzy Inference System to Reduce False Positives in Intrusion Detection , 2009, 2009 16th International Conference on Systems, Signals and Image Processing.
[12] Stefan Axelsson,et al. The base-rate fallacy and the difficulty of intrusion detection , 2000, TSEC.
[13] Bart Kosko,et al. Neural networks and fuzzy systems: a dynamical systems approach to machine intelligence , 1991 .
[14] I. B. Turksen,et al. A review of developments in fuzzy system models: Fuzzy rule bases to fuzzy functions , 2011 .
[15] Symeon Papavassiliou,et al. Network intrusion and fault detection: a statistical anomaly approach , 2002, IEEE Commun. Mag..
[16] Yih-Lon Lin,et al. On maximum likelihood fuzzy neural networks , 2010, Fuzzy Sets Syst..
[17] Li Guo,et al. An active learning based TCM-KNN algorithm for supervised network intrusion detection , 2007, Comput. Secur..
[18] Michel Ménard,et al. Fuzzy clustering and switching regression models using ambiguity and distance rejects , 2001, Fuzzy Sets Syst..
[19] Ashraf Darwish,et al. Principle components analysis and Support Vector Machine based Intrusion Detection System , 2010, 2010 10th International Conference on Intelligent Systems Design and Applications.
[20] Yie-Chien Chen,et al. A model reference control structure using a fuzzy neural network , 1995 .
[21] Mohamed S. Kamel,et al. RBF-based real-time hierarchical intrusion detection systems , 2003, Proceedings of the International Joint Conference on Neural Networks, 2003..
[22] Risto Miikkulainen,et al. Intrusion Detection with Neural Networks , 1997, NIPS.
[23] Ali A. Ghorbani,et al. A detailed analysis of the KDD CUP 99 data set , 2009, 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications.