Detection of intrusion using evolutionary soft computing techniques
暂无分享,去创建一个
[1] Neil T. Heffernan,et al. Applying Machine Learning Techniques to Rule Generation in Intelligent Tutoring Systems , 2004, Intelligent Tutoring Systems.
[2] Jinglu Hu,et al. Association rules mining for handling continuous attributes using genetic network programming and fuzzy membership functions , 2007, SICE Annual Conference 2007.
[3] K. Shimada,et al. Self-Adaptive Mechanism in Genetic Network Programming for Mining Association Rules , 2006, 2006 SICE-ICASE International Joint Conference.
[4] Salvatore J. Stolfo,et al. Data Mining Approaches for Intrusion Detection , 1998, USENIX Security Symposium.
[5] Jinglu Hu,et al. Genetic network programming with class association rule acquisition mechanisms from incomplete database , 2007, SICE Annual Conference 2007.
[6] S. Mabu,et al. Discovering fuzzy classification rules using Genetic Network Programming , 2008, 2008 SICE Annual Conference.
[7] Kotaro Hirasawa,et al. Genetic Network Programming with Acquisition Mechanisms of Association Rules , 2006, J. Adv. Comput. Intell. Intell. Informatics.
[8] Norbik Bashah Idris,et al. Novel Attack Detection Using Fuzzy Logic and Data Mining , 2006, Security and Management.
[9] K. R. Chandran,et al. Efficient Associative Classification using Genetic Network Programming , 2011 .
[10] Shingo Mabu,et al. An Intrusion-Detection Model Based on Fuzzy Class-Association-Rule Mining Using Genetic Network Programming , 2011, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).
[11] Shingo Mabu,et al. Network intrusion detection using fuzzy class association rule mining based on genetic network programming , 2009, 2009 IEEE International Conference on Systems, Man and Cybernetics.
[12] Kotaro Hirasawa,et al. Class Association Rule Mining with Chi-Squared Test Using Genetic Network Programming , 2006, 2006 IEEE International Conference on Systems, Man and Cybernetics.
[13] Wei Lu,et al. Detecting New Forms of Network Intrusion Using Genetic Programming , 2004, Comput. Intell..
[14] Rakesh Agarwal,et al. Fast Algorithms for Mining Association Rules , 1994, VLDB 1994.
[15] I. Ramesh Babu. Intrusion Detection Using Data Mining Along Fuzzy Logic and Genetic Algorithms , 2008 .
[16] Wang Yunwu. Using Fuzzy Expert System Based on Genetic Algorithms for Intrusion Detection System , 2009, 2009 International Forum on Information Technology and Applications.
[17] Shingo Mabu,et al. Fuzzy classification rule mining based on Genetic Network Programming algorithm , 2009, 2009 IEEE International Conference on Systems, Man and Cybernetics.
[18] Man Hon Wong,et al. Mining fuzzy association rules in databases , 1998, SGMD.
[19] Peter J. Angeline,et al. Adaptive and Self-adaptive Evolutionary Computations , 1995 .
[20] Petra Perner,et al. Data Mining - Concepts and Techniques , 2002, Künstliche Intell..
[21] Md. Abu Naser Bikas,et al. An Implementation of Intrusion Detection System Using Genetic Algorithm , 2012, ArXiv.
[22] Chunhua Wang,et al. Intrusion Detection Based on Fuzzy Association Rules , 2010, 2010 International Symposium on Intelligence Information Processing and Trusted Computing.
[23] Dorothy E. Denning,et al. An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.
[24] Shingo Mabu,et al. Online learning of genetic network programming (GNP) , 2002, Proceedings of the 2002 Congress on Evolutionary Computation. CEC'02 (Cat. No.02TH8600).
[25] Shingo Mabu,et al. Analysis of fuzzy class association rule mining based on Genetic Network Programming , 2009, 2009 ICCAS-SICE.
[26] Ramakrishnan Srikant,et al. Mining quantitative association rules in large relational tables , 1996, SIGMOD '96.
[27] Shingo Mabu,et al. Genetic Network Programming for fuzzy association rule-based classification , 2009, 2009 IEEE Congress on Evolutionary Computation.
[28] Bo-Hyeun Wang,et al. Automatic rule generation for fuzzy controllers using genetic algorithms: a study on representation scheme and mutation rate , 1998, 1998 IEEE International Conference on Fuzzy Systems Proceedings. IEEE World Congress on Computational Intelligence (Cat. No.98CH36228).
[29] Vivek K. Kshirsagar,et al. Intrusion Detection System using Genetic Algorithm and Data Mining: An Overview , 2012 .
[30] Kotaro Hirasawa,et al. Comparison between Genetic Network Programming (GNP) and Genetic Programming (GP) , 2001, Proceedings of the 2001 Congress on Evolutionary Computation (IEEE Cat. No.01TH8546).
[31] Kotaro Hirasawa,et al. Genetic Network Programming with Acquisition Mechanisms of Association Rules in Dense Database , 2005, International Conference on Computational Intelligence for Modelling, Control and Automation and International Conference on Intelligent Agents, Web Technologies and Internet Commerce (CIMCA-IAWTIC'06).
[32] Jonatan Gómez,et al. Evolving Fuzzy Classifiers for Intrusion Detection , 2002 .
[33] Zheng Pei,et al. MINING FUZZY ASSOCIATION RULES FROM DATABASE , 2009 .
[34] Shingo Mabu,et al. Association rule mining for continuous attributes using genetic network programming , 2007, GECCO '07.