A triangle area based nearest neighbors approach to intrusion detection
暂无分享,去创建一个
[1] Malcolm I. Heywood,et al. A Hierarchical SOM based Intrusion Detection System , 2008 .
[2] Arlindo L. Oliveira,et al. Semi-supervised single-label text categorization using centroid-based classifiers , 2007, SAC '07.
[3] Tom Fawcett,et al. An introduction to ROC analysis , 2006, Pattern Recognit. Lett..
[4] Anil K. Jain,et al. Statistical Pattern Recognition: A Review , 2000, IEEE Trans. Pattern Anal. Mach. Intell..
[5] Stephen Northcutt,et al. Network Intrusion Detection: An Analyst's Hand-book , 1999 .
[6] Tansel Özyer,et al. Intrusion detection by integrating boosting genetic fuzzy classifier and data mining criteria for rule pre-screening , 2007, J. Netw. Comput. Appl..
[7] Bo Yang,et al. Hybrid flexible neural‐tree‐based intrusion detection systems , 2007, Int. J. Intell. Syst..
[8] Salvatore J. Stolfo,et al. Real time data mining-based intrusion detection , 2001, Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01.
[9] William Stallings,et al. Cryptography and Network Security: Principles and Practice , 1998 .
[10] Bhavani M. Thuraisingham,et al. A new intrusion detection system using support vector machines and hierarchical clustering , 2007, The VLDB Journal.
[11] Inyoung Kim,et al. A latent class modeling approach to detect network intrusion , 2006, Comput. Commun..
[12] Sheng-Hsun Hsu,et al. Application of SVM and ANN for intrusion detection , 2005, Comput. Oper. Res..
[13] Chunlin Zhang,et al. Intrusion detection using hierarchical neural networks , 2005, Pattern Recognit. Lett..
[14] Jung-Min Park,et al. An overview of anomaly detection techniques: Existing solutions and latest technological trends , 2007, Comput. Networks.
[15] Hong Shen,et al. Application of online-training SVMs for real-time intrusion detection with different considerations , 2005, Comput. Commun..
[16] Ajith Abraham,et al. Modeling intrusion detection system using hybrid intelligent systems , 2007, J. Netw. Comput. Appl..
[17] Wei Zhang,et al. A genetic clustering method for intrusion detection , 2004, Pattern Recognit..
[18] Zhang Yi,et al. A hierarchical intrusion detection model based on the PCA neural networks , 2007, Neurocomputing.
[19] Andrew H. Sung,et al. Intrusion detection using an ensemble of intelligent paradigms , 2005, J. Netw. Comput. Appl..
[20] Jaideep Srivastava,et al. Data Mining for Network Intrusion Detection , 2002 .
[21] Taeshik Shon,et al. A hybrid machine learning approach to network anomaly detection , 2007, Inf. Sci..
[22] Mohammad Saniee Abadeh,et al. A parallel genetic local search algorithm for intrusion detection in computer networks , 2007, Eng. Appl. Artif. Intell..
[23] Li Guo,et al. An active learning based TCM-KNN algorithm for supervised network intrusion detection , 2007, Comput. Secur..
[24] Taeshik Shon,et al. Applying genetic algorithm for classifying anomalous TCP/IP packets , 2006, Neurocomputing.