An Enhanced Fuzzy ARM Approach for Intrusion Detection

Original article can be found at: http://www.igi-global.com/ Copyright IGI Global [Full text of this article is not available in the UHRA]

[1]  Rayford B. Vaughn,et al.  An improved algorithm for fuzzy data mining for intrusion detection , 2002, 2002 Annual Meeting of the North American Fuzzy Information Processing Society Proceedings. NAFIPS-FLINT 2002 (Cat. No. 02TH8622).

[2]  Eliot Winer,et al.  Three-dimensional segmentation of tumors from CT image data using an adaptive fuzzy system , 2009, Comput. Biol. Medicine.

[3]  Gordon A. Manson,et al.  An intelligent approach to prevent distributed systems attacks , 2002, Inf. Manag. Comput. Secur..

[4]  Ulf E. Larson,et al.  Conducting forensic investigations of cyber attacks on automobile in-vehicle networks , 2008 .

[5]  Julie A. Dickerson,et al.  Fuzzy network profiling for intrusion detection , 2000, PeachFuzz 2000. 19th International Conference of the North American Fuzzy Information Processing Society - NAFIPS (Cat. No.00TH8500).

[6]  Ramakrishnan Srikant,et al.  Fast Algorithms for Mining Association Rules in Large Databases , 1994, VLDB.

[7]  Abdullah Gani,et al.  Bayesian Learning Networks Approach to Cybercrime Detection , 2003 .

[8]  Yixin Chen,et al.  Support vector learning for fuzzy rule-based classification systems , 2003, IEEE Trans. Fuzzy Syst..

[9]  Gordon A. Manson,et al.  Evaluation of Intelligent Intrusion Detection Models , 2004, Int. J. Digit. EVid..

[10]  J. M. Serrano,et al.  Association rules applied to credit card fraud detection , 2009, Expert Syst. Appl..

[11]  Eyke Hüllermeier,et al.  A systematic approach to the assessment of fuzzy association rules , 2006, Data Mining and Knowledge Discovery.

[12]  Abu Bakar,et al.  A Chi-square testing-based intrusion detection Model , 2010 .

[13]  Zhu Xiaorong,et al.  The Research on the Application of Association Rules Mining Algorithm in Network Intrusion Detection , 2009, 2009 First International Workshop on Education Technology and Computer Science.

[14]  Abdolreza Mirzaei,et al.  Intrusion detection using fuzzy association rules , 2009, Appl. Soft Comput..

[15]  Michael Davis,et al.  Grey Areas - The Legal Dimensions of Cloud Computing , 2010, Int. J. Digit. Crime Forensics.

[16]  Yubo Yuan,et al.  A Matrix Algorithm for Mining Association Rules , 2005, ICIC.

[17]  Susan M. Bridges,et al.  FUZZY DATA MINING AND GENETIC ALGORITHMS APPLIED TO INTRUSION DETECTION , 2002 .

[18]  Sonia Fahmy,et al.  Accurately Measuring Denial of Service in Simulation and Testbed Experiments , 2009, IEEE Transactions on Dependable and Secure Computing.

[19]  Susan M. Bridges,et al.  Mining fuzzy association rules and fuzzy frequency episodes for intrusion detection , 2000 .

[20]  Gabriel Maciá-Fernández,et al.  Mathematical Model for Low-Rate DoS Attacks Against Application Servers , 2009, IEEE Transactions on Information Forensics and Security.

[21]  Panagiotis Kanellis,et al.  Digital Crime And Forensic Science in Cyberspace (N/A) , 2006 .

[22]  Lotfi A. Zadeh,et al.  Fuzzy logic, neural networks, and soft computing , 1993, CACM.

[23]  Stefan Savage,et al.  Inferring Internet denial-of-service activity , 2001, TOCS.

[24]  Salvatore J. Stolfo,et al.  A framework for constructing features and models for intrusion detection systems , 2000, TSEC.

[25]  Radha Poovendran,et al.  Evaluating the Vulnerability of Network Traffic Using Joint Security and Routing Analysis , 2009, IEEE Transactions on Dependable and Secure Computing.

[26]  Ming-Yang Su,et al.  A real-time network intrusion detection system for large-scale attacks based on an incremental mining approach , 2009, Comput. Secur..

[27]  Julie A. Dickerson,et al.  Fuzzy intrusion detection , 2001, Proceedings Joint 9th IFSA World Congress and 20th NAFIPS International Conference (Cat. No. 01TH8569).