An overview of neural networks use in anomaly Intrusion Detection Systems
暂无分享,去创建一个
Solahuddin Shamsuddin | Ahmed Mohamedou | Yusuf Sani | Khalid Ali | Anahita Farjamfar | Mohamed Azman | S. Shamsuddin | Ahmed Mohamedou | Yusuf Sani | Khalid Ali | Anahita Farjamfar | Mohamed Azman
[1] Hervé Debar,et al. A neural network component for an intrusion detection system , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.
[2] Abdulkader A. Alfantookh,et al. DoS Attacks Intelligent Detection using Neural Networks , 2006, J. King Saud Univ. Comput. Inf. Sci..
[3] Venus W. Samawi,et al. The affect of fuzzification on neural networks intrusion detection system , 2009, 2009 4th IEEE Conference on Industrial Electronics and Applications.
[4] Dorothy E. Denning,et al. An Intrusion-Detection Model , 1986, 1986 IEEE Symposium on Security and Privacy.
[5] Teresa F. Lunt,et al. A survey of intrusion detection techniques , 1993, Comput. Secur..
[6] Phillip A. Porras,et al. STAT -- A State Transition Analysis Tool For Intrusion Detection , 1993 .
[7] Teuvo Kohonen,et al. The self-organizing map , 1990 .
[8] Risto Miikkulainen,et al. Intrusion Detection with Neural Networks , 1997, NIPS.
[9] Michael Schatz,et al. Learning Program Behavior Profiles for Intrusion Detection , 1999, Workshop on Intrusion Detection and Network Monitoring.
[10] Mehdi MORADI,et al. A Neural Network Based System for Intrusion Detection and Classification of Attacks , 2004 .
[11] Sung-Bae Cho,et al. Evolutionary neural networks for anomaly detection based on the behavior of a program , 2005, IEEE Trans. Syst. Man Cybern. Part B.
[12] Elidon Beqiri,et al. Neural Networks for Intrusion Detection Systems , 2009 .
[13] James Cannady,et al. Artificial Neural Networks for Misuse Detection , 1998 .
[14] Boleslaw K. Szymanski,et al. NETWORK-BASED INTRUSION DETECTION USING NEURAL NETWORKS , 2002 .
[15] Ray Hunt,et al. Intrusion detection techniques and approaches , 2002, Comput. Commun..
[16] Ingoo Han,et al. The neural network models for IDS based on the asymmetric costs of false negative errors and false positive errors , 2003, Expert Syst. Appl..
[17] Andrew H. Sung,et al. Intrusion detection using an ensemble of intelligent paradigms , 2005, J. Netw. Comput. Appl..