Computational intelligence in cyber security
暂无分享,去创建一个
[1] Hervé Debar,et al. An application of a recurrent network to an intrusion detection system , 1992, [Proceedings 1992] IJCNN International Joint Conference on Neural Networks.
[2] Gary McGraw,et al. Detecting Anomalous and Unknown Intrusions against Programs in Real-Time. , 1997 .
[3] Fabio A. González,et al. An Evolutionary Approach to Generate Fuzzy Anomaly Signatures , 2003, IAW.
[4] Salvatore J. Stolfo,et al. Using artificial anomalies to detect unknown and known network intrusions , 2003, Knowledge and Information Systems.
[5] Alex Alves Freitas,et al. Discovering comprehensible classification rules by using Genetic Programming: a case study in a medical domain , 1999, GECCO.
[6] Fabio A. González,et al. An immuno-fuzzy approach to anomaly detection , 2003, The 12th IEEE International Conference on Fuzzy Systems, 2003. FUZZ '03..
[7] Sanjay Rawat,et al. Enhancing Computer Security with Smart Technology , 2006 .
[8] D. Dasgupta,et al. Mobile security agents for network traffic analysis , 2001, Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01.
[9] Anup Ghosh,et al. Simple, state-based approaches to program-based anomaly detection , 2002, TSEC.
[10] Susan M. Bridges,et al. FUZZY DATA MINING AND GENETIC ALGORITHMS APPLIED TO INTRUSION DETECTION , 2002 .
[11] Fabio A. González,et al. An Intelligent Decision Support System for Intrusion Detection and Response , 2001, MMM-ACNS.
[12] William L. Fithen,et al. State of the Practice of Intrusion Detection Technologies , 2000 .
[13] Kymie M. C. Tan,et al. Detection and classification of TCP/IP network services , 1997, Proceedings 13th Annual Computer Security Applications Conference.
[14] Arthur B. Maccabe,et al. The architecture of a network level intrusion detection system , 1990 .
[15] Eugene H. Spafford,et al. Applying Genetic Programming to Intrusion Detection , 1995 .
[16] Eugene H. Spafford,et al. An architecture for intrusion detection using autonomous agents , 1998, Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217).
[17] Marc Dacier,et al. Intrusion detection , 1999, Comput. Networks.
[18] Sushil Jajodia,et al. Enhancing Profiles for Anomaly Detection Using Time Granularities , 2002, J. Comput. Secur..
[19] Graham J. Williams,et al. On-Line Unsupervised Outlier Detection Using Finite Mixtures with Discounting Learning Algorithms , 2000, KDD '00.
[20] Dipankar Dasgupta. Immunity-Based Intrusion Detection System: A General Framework , 1999 .
[21] Stefan Axelsson,et al. Intrusion Detection Systems: A Survey and Taxonomy , 2002 .
[22] K. Tan,et al. The application of neural networks to UNIX computer security , 1995, Proceedings of ICNN'95 - International Conference on Neural Networks.
[23] Salvatore J. Stolfo,et al. Mining Audit Data to Build Intrusion Detection Models , 1998, KDD.
[24] Hervé Debar,et al. A neural network component for an intrusion detection system , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.