Neuro-Immune and Self-Organizing Map Approaches to Anomaly Detection: A Comparison
暂无分享,去创建一个
[1] Stephanie Forrest,et al. Architecture for an Artificial Immune System , 2000, Evolutionary Computation.
[2] Dorothy E. Denning,et al. An Intrusion-Detection Model , 1986, 1986 IEEE Symposium on Security and Privacy.
[3] Leonid Portnoy,et al. Intrusion detection with unlabeled data using clustering , 2000 .
[4] D. Dasgupta,et al. Combining negative selection and classification techniques for anomaly detection , 2002, Proceedings of the 2002 Congress on Evolutionary Computation. CEC'02 (Cat. No.02TH8600).
[5] Yoshikiyo Kato,et al. Fault Detection by Mining Association Rules from House-keeping Data , 2001 .
[6] Fabio A. González,et al. An immunity-based technique to characterize intrusions in computer networks , 2002, IEEE Trans. Evol. Comput..
[7] Fabio A. González,et al. An Imunogenetic Technique To Detect Anomalies In Network Traffic , 2002, GECCO.
[8] J. Mesirov,et al. Interpreting patterns of gene expression with self-organizing maps: methods and application to hematopoietic differentiation. , 1999, Proceedings of the National Academy of Sciences of the United States of America.
[9] Simon Haykin,et al. Neural Networks: A Comprehensive Foundation , 1998 .
[10] Teuvo Kohonen,et al. Self-Organizing Maps , 2010 .
[11] Ron Kohavi,et al. The Case against Accuracy Estimation for Comparing Induction Algorithms , 1998, ICML.
[12] Eamonn J. Keogh,et al. Finding surprising patterns in a time series database in linear time and space , 2002, KDD.
[13] Paul Helman,et al. An immunological approach to change detection: algorithms, analysis and implications , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[14] Salvatore J. Stolfo,et al. Data Mining Approaches for Intrusion Detection , 1998, USENIX Security Symposium.
[15] Dipankar Dasgupta,et al. Novelty detection in time series data using ideas from immunology , 1996 .
[16] David Tcheng,et al. Self-organizing systems for knowledge discovery in large databases , 1999, IJCNN'99. International Joint Conference on Neural Networks. Proceedings (Cat. No.99CH36339).
[17] Carla E. Brodley,et al. Machine learning techniques for the computer security domain of anomaly detection , 2000 .
[18] Alan S. Perelson,et al. Self-nonself discrimination in a computer , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.