Four Char DNA Encoding for Anomaly Intrusion Detection System
暂无分享,去创建一个
[1] Dieter Hogrefe,et al. Two Layers Multi-class Detection method for network Intrusion Detection System , 2017, 2017 IEEE Symposium on Computers and Communications (ISCC).
[2] Md. Abu Naser Bikas,et al. An Implementation of Intrusion Detection System Using Genetic Algorithm , 2012, ArXiv.
[3] Chithralekha Balamurugan,et al. A Novel DNA Computing Based Encryption and Decryption Algorithm , 2015 .
[4] Mohamed Moughit,et al. An efficient method for evaluating alerts of Intrusion Detection Systems , 2017, 2017 International Conference on Wireless Technologies, Embedded and Intelligent Systems (WITS).
[5] Adel Sabry Eesa,et al. A novel feature-selection approach based on the cuttlefish optimization algorithm for intrusion detection systems , 2015, Expert Syst. Appl..
[6] Manuel Alfonseca,et al. Network intrusion detection using genetic algorithm to find best DNA signature , 2008, ICONS 2008.
[7] Liang He,et al. An Improved Intrusion Detection based on Neural Network and Fuzzy Algorithm , 2014, J. Networks.
[8] Cherukuri Aswani Kumar,et al. Intrusion detection model using fusion of chi-square feature selection and multi class SVM , 2017, J. King Saud Univ. Comput. Inf. Sci..
[9] A. Ayyasamy,et al. A Novel Ensemble Approach for Effective Intrusion Detection System , 2017, 2017 Second International Conference on Recent Trends and Challenges in Computational Models (ICRTCCM).
[10] Zulaiha Ali Othman,et al. A novel DNA sequence approach for network intrusion detection system based on cryptography encoding method , 2017 .
[12] Wathiq Laftah Al-Yaseen,et al. Multi-level hybrid support vector machine and extreme learning machine based on modified K-means for intrusion detection system , 2017, Expert Syst. Appl..
[13] Stefan Savage,et al. Inside the Slammer Worm , 2003, IEEE Secur. Priv..
[14] Sarab M. Hameed,et al. Intrusion Detection Approach Based on DNA Signature , 2014 .
[15] Ranbir Soram,et al. Biometric DNA and ECDLP-based Personal Authentication System: A Superior Posse of Security , 2010 .
[16] Wolfgang Banzhaf,et al. The use of computational intelligence in intrusion detection systems: A review , 2010, Appl. Soft Comput..
[17] Zhang Bin,et al. A Clustering Algorithm Oriented to Intrusion Detection , 2017, 22017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC).
[18] Zulaiha Ali Othman,et al. Matching algorithms for intrusion detection system based on DNA encoding , 2018 .
[19] Wenjuan Li,et al. Constructing Context-based Non-Critical Alarm Filter in Intrusion Detection , 2012 .
[20] Karen A. Scarfone,et al. Guide to Intrusion Detection and Prevention Systems (IDPS) , 2007 .