Network forensics with Neurofuzzy techniques
暂无分享,去创建一个
[1] Lefteri H. Tsoukalas,et al. Fuzzy and neural approaches in engineering , 1997 .
[2] Y. Demidova,et al. Neural Network Approach of Attack's Detection In the Network Traffic , 2007, 2007 9th International Conference - The Experience of Designing and Applications of CAD Systems in Microelectronics.
[3] David F. Andersen,et al. Preliminary System Dynamics Maps of the Insider Cyber-threat Problem , 2004 .
[4] Wei Wang,et al. Diffusion and graph spectral methods for network forensic analysis , 2006, NSPW '06.
[5] Dong-Geun Kim,et al. A fuzzy logic based expert system as a network forensics , 2004, 2004 IEEE International Conference on Fuzzy Systems (IEEE Cat. No.04CH37542).
[6] Thomas A. Longstaff,et al. A common language for computer security incidents , 1998 .
[7] Bruce J. Nikkel. Generalizing sources of live network evidence , 2005, Digital Investigation. The International Journal of Digital Forensics and Incident Response.
[8] Cal Waits,et al. First Responders Guide to Computer Forensics , 2005 .
[9] Keith Marzullo,et al. Principles-driven forensic analysis , 2005, NSPW '05.
[10] Abdul Azim Abd Ghani,et al. Advances in computer forensics , 2008 .
[11] Wanlei Zhou,et al. Mark-aided distributed filtering by using neural network for DDoS defense , 2005, GLOBECOM '05. IEEE Global Telecommunications Conference, 2005..
[12] E. Rosti,et al. Trusted Internet forensics: design of a network forensics appliance , 2005, Workshop of the 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks, 2005..