Incremental Hybrid Intrusion Detection Using Ensemble of Weak Classifiers
暂无分享,去创建一个
[1] Salvatore J. Stolfo,et al. FLIPS: Hybrid Adaptive Intrusion Prevention , 2005, RAID.
[2] Mohammad Zulkernine,et al. A hybrid network intrusion detection technique using random forests , 2006, First International Conference on Availability, Reliability and Security (ARES'06).
[3] Alfonso Valdes,et al. Next-generation Intrusion Detection Expert System (NIDES)A Summary , 1997 .
[4] Richard A. Kemmerer,et al. State Transition Analysis: A Rule-Based Intrusion Detection Approach , 1995, IEEE Trans. Software Eng..
[5] Sushil Jajodia,et al. ADAM: Detecting Intrusions by Data Mining , 2001 .
[6] Hervé Debar,et al. A serial combination of anomaly and misuse IDSes applied to HTTP traffic , 2004, 20th Annual Computer Security Applications Conference.
[7] Christopher Krügel,et al. Service specific anomaly detection for network intrusion detection , 2002, SAC '02.
[8] Taghi M. Khoshgoftaar,et al. CLUSTERING-BASED NETWORK INTRUSION DETECTION , 2007 .
[9] Vasant Honavar,et al. Learn++: an incremental learning algorithm for supervised neural networks , 2001, IEEE Trans. Syst. Man Cybern. Part C.
[10] Cheng Xiang,et al. Design of Multiple-Level Hybrid Classifier for Intrusion Detection System , 2005 .
[11] Yoav Freund,et al. A decision-theoretic generalization of on-line learning and an application to boosting , 1995, EuroCOLT.
[12] Ulf Lindqvist,et al. Detecting computer and network misuse through the production-based expert system toolset (P-BEST) , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).
[13] Peter G. Neumann,et al. EMERALD: Event Monitoring Enabling Responses to Anomalous Live Disturbances , 1997, CCS 2002.
[14] Arthur B. Maccabe,et al. The architecture of a network level intrusion detection system , 1990 .
[15] Guan Jian,et al. An induction learning approach for building intrusion detection models using genetic algorithms , 2004, Fifth World Congress on Intelligent Control and Automation (IEEE Cat. No.04EX788).
[16] A. Krzyżak,et al. Methods of CombiningMultiple Classifiers and Their Application to Handwriting Recognition , 1992 .
[17] Wu Yang,et al. Using incremental learning method for adaptive network intrusion detection , 2005, 2005 International Conference on Machine Learning and Cybernetics.
[18] F. Neri,et al. Comparing local search with respect to genetic evolution to detect intrusions in computer networks , 2000, Proceedings of the 2000 Congress on Evolutionary Computation. CEC00 (Cat. No.00TH8512).
[19] Naji Habra,et al. Distributed audit trail analysis , 1995, Proceedings of the Symposium on Network and Distributed System Security.
[20] Ying Chen,et al. Hybrid Intrusion Detection with Weighted Signature Generation over Anomalous Internet Episodes , 2007, IEEE Transactions on Dependable and Secure Computing.
[21] Hisham M. Haddad,et al. Proceedings of the 2002 ACM Symposium on Applied Computing (SAC), March 10-14, 2002, Madrid, Spain , 2002, SAC.
[22] Emin Anarim,et al. An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks , 2005, Expert Syst. Appl..
[23] Rebecca Gurley Bace,et al. Intrusion Detection , 2018, Encyclopedia of Social Network Analysis and Mining. 2nd Ed..