An Enhanced Fuzzy ARM Approach for Intrusion Detection
暂无分享,去创建一个
[1] Rayford B. Vaughn,et al. An improved algorithm for fuzzy data mining for intrusion detection , 2002, 2002 Annual Meeting of the North American Fuzzy Information Processing Society Proceedings. NAFIPS-FLINT 2002 (Cat. No. 02TH8622).
[2] Eliot Winer,et al. Three-dimensional segmentation of tumors from CT image data using an adaptive fuzzy system , 2009, Comput. Biol. Medicine.
[3] Gordon A. Manson,et al. An intelligent approach to prevent distributed systems attacks , 2002, Inf. Manag. Comput. Secur..
[4] Ulf E. Larson,et al. Conducting forensic investigations of cyber attacks on automobile in-vehicle networks , 2008 .
[5] Julie A. Dickerson,et al. Fuzzy network profiling for intrusion detection , 2000, PeachFuzz 2000. 19th International Conference of the North American Fuzzy Information Processing Society - NAFIPS (Cat. No.00TH8500).
[6] Ramakrishnan Srikant,et al. Fast Algorithms for Mining Association Rules in Large Databases , 1994, VLDB.
[7] Abdullah Gani,et al. Bayesian Learning Networks Approach to Cybercrime Detection , 2003 .
[8] Yixin Chen,et al. Support vector learning for fuzzy rule-based classification systems , 2003, IEEE Trans. Fuzzy Syst..
[9] Gordon A. Manson,et al. Evaluation of Intelligent Intrusion Detection Models , 2004, Int. J. Digit. EVid..
[10] J. M. Serrano,et al. Association rules applied to credit card fraud detection , 2009, Expert Syst. Appl..
[11] Eyke Hüllermeier,et al. A systematic approach to the assessment of fuzzy association rules , 2006, Data Mining and Knowledge Discovery.
[12] Abu Bakar,et al. A Chi-square testing-based intrusion detection Model , 2010 .
[13] Zhu Xiaorong,et al. The Research on the Application of Association Rules Mining Algorithm in Network Intrusion Detection , 2009, 2009 First International Workshop on Education Technology and Computer Science.
[14] Abdolreza Mirzaei,et al. Intrusion detection using fuzzy association rules , 2009, Appl. Soft Comput..
[15] Michael Davis,et al. Grey Areas - The Legal Dimensions of Cloud Computing , 2010, Int. J. Digit. Crime Forensics.
[16] Yubo Yuan,et al. A Matrix Algorithm for Mining Association Rules , 2005, ICIC.
[17] Susan M. Bridges,et al. FUZZY DATA MINING AND GENETIC ALGORITHMS APPLIED TO INTRUSION DETECTION , 2002 .
[18] Sonia Fahmy,et al. Accurately Measuring Denial of Service in Simulation and Testbed Experiments , 2009, IEEE Transactions on Dependable and Secure Computing.
[19] Susan M. Bridges,et al. Mining fuzzy association rules and fuzzy frequency episodes for intrusion detection , 2000 .
[20] Gabriel Maciá-Fernández,et al. Mathematical Model for Low-Rate DoS Attacks Against Application Servers , 2009, IEEE Transactions on Information Forensics and Security.
[21] Panagiotis Kanellis,et al. Digital Crime And Forensic Science in Cyberspace (N/A) , 2006 .
[22] Lotfi A. Zadeh,et al. Fuzzy logic, neural networks, and soft computing , 1993, CACM.
[23] Stefan Savage,et al. Inferring Internet denial-of-service activity , 2001, TOCS.
[24] Salvatore J. Stolfo,et al. A framework for constructing features and models for intrusion detection systems , 2000, TSEC.
[25] Radha Poovendran,et al. Evaluating the Vulnerability of Network Traffic Using Joint Security and Routing Analysis , 2009, IEEE Transactions on Dependable and Secure Computing.
[26] Ming-Yang Su,et al. A real-time network intrusion detection system for large-scale attacks based on an incremental mining approach , 2009, Comput. Secur..
[27] Julie A. Dickerson,et al. Fuzzy intrusion detection , 2001, Proceedings Joint 9th IFSA World Congress and 20th NAFIPS International Conference (Cat. No. 01TH8569).