A Neural Network Based Anomaly Intrusion Detection System
暂无分享,去创建一个
[1] Debra S. Herrmann,et al. A Practical Guide to Security Engineering and Information Assurance , 2001 .
[2] Ray Hunt,et al. Intrusion detection techniques and approaches , 2002, Comput. Commun..
[3] Ajith Abraham,et al. Modeling intrusion detection system using hybrid intelligent systems , 2007, J. Netw. Comput. Appl..
[4] Monis Akhlaq,et al. Evaluating Intrusion Detection Systems in High Speed Networks , 2009, 2009 Fifth International Conference on Information Assurance and Security.
[5] Peter Mell,et al. NIST Special Publication on Intrusion Detection Systems , 2001 .
[6] Ingoo Han,et al. The neural network models for IDS based on the asymmetric costs of false negative errors and false positive errors , 2003, Expert Syst. Appl..
[7] Mansour Sheikhan,et al. Fast Neural Intrusion Detection System Based on Hidden Weight Optimization Algorithm and Feature Selection , 2009 .
[8] Konstantinos Veropoulos,et al. Medical Decision Making , 2011, Yamada's Textbook of Gastroenterology.
[9] A. Roli. Artificial Neural Networks , 2012, Lecture Notes in Computer Science.
[10] Martin T. Hagan,et al. Neural network design , 1995 .
[11] Peter Mell,et al. Intrusion Detection Systems , 2001 .
[12] Ranadhir Ghosh,et al. A Novel Hybrid Learning Algorithm For Artificial Neural Networks , 2003 .
[13] Theodoros Lappas,et al. Data Mining Techniques for ( Network ) Intrusion Detection Systems , 2007 .
[14] B. Yegnanarayana,et al. Artificial Neural Networks , 2004 .
[15] W. Marsden. I and J , 2012 .
[16] R.K. Cunningham,et al. Evaluating intrusion detection systems: the 1998 DARPA off-line intrusion detection evaluation , 2000, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.
[17] W. Mahoney,et al. IDEA: A New Intrusion Detection Data Source , 2008, 2008 International Conference on Information Security and Assurance (isa 2008).
[18] Alexandr Seleznyov,et al. An anomaly intrusion detection system based on Intelligent user recognition , 2002 .
[19] P. Kiran Sree. Exploring a Novel Approach for providing Software Security Using Soft Computing Systems , 2008 .
[20] Philip K. Chan,et al. PHAD: packet header anomaly detection for identifying hostile network traffic , 2001 .