Detecting Mixed-Type Intrusion in High Adaptability Using Artificial Immune System and Parallelized Automata
暂无分享,去创建一个
Yenming J. Chen | Wen-Hsien Ho | Jinn-Tsong Tsai | Chia-Wen Chang | Fu-I Chou | Yenming J. Chen | W. Ho | J. Tsai | Fu-I Chou | Chia-Wen Chang | Wen-Hsien Ho | Jinn-Tsong Tsai
[1] Chia-Nan Wang,et al. A Multi-Criteria Decision Making (MCDM) for Renewable Energy Plants Location Selection in Vietnam under a Fuzzy Environment , 2018, Applied Sciences.
[2] Claudia Eckert,et al. On the appropriateness of negative selection defined over Hamming shape-space as a network intrusion detection system , 2005, 2005 IEEE Congress on Evolutionary Computation.
[3] Yiqiang Sheng,et al. A Graph Representation Learning Algorithm for Low-Order Proximity Feature Extraction to Enhance Unsupervised IDS Preprocessing , 2019, Applied Sciences.
[4] Jiankun Hu,et al. A novel statistical technique for intrusion detection systems , 2018, Future Gener. Comput. Syst..
[5] Bo Lang,et al. Machine Learning and Deep Learning Methods for Intrusion Detection Systems: A Survey , 2019, Applied Sciences.
[6] Gerry V. Dozier,et al. Vulnerability analysis of AIS-based intrusion detection systems via genetic and particle swarm red teams , 2004, Proceedings of the 2004 Congress on Evolutionary Computation (IEEE Cat. No.04TH8753).
[7] Yenming J. Chen,et al. Multi-objective Pareto adaptive algorithm for capacitated lot-sizing problems in glass lens production , 2018 .
[8] Luigi Barone,et al. On XCSR for electronic fraud detection , 2012, Evol. Intell..
[9] Andrew M. Tyrrell,et al. Immunotronics - novel finite-state-machine architectures with built-in self-test using self-nonself differentiation , 2002, IEEE Trans. Evol. Comput..
[10] Ying Chen,et al. Hybrid Intrusion Detection with Weighted Signature Generation over Anomalous Internet Episodes , 2007, IEEE Transactions on Dependable and Secure Computing.
[11] W.W.Y. Ng,et al. Refinement of rule-based intrusion detection system for denial of service attacks by support vector machine , 2004, Proceedings of 2004 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.04EX826).
[12] Shadi Aljawarneh,et al. Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model , 2017, J. Comput. Sci..
[13] Youngjoo Shin. A VM-Based Detection Framework against Remote Code Execution Attacks for Closed Source Network Devices , 2019 .
[14] Bhupendra Verma,et al. An efficient proactive artificial immune system based anomaly detection and prevention system , 2016, Expert Syst. Appl..
[15] Timo D. Hämäläinen,et al. Assessment of Deep Learning Methodology for Self-Organizing 5G Networks , 2019, Applied Sciences.
[16] Peter J. Bentley,et al. Towards an artificial immune system for network intrusion detection: an investigation of clonal selection with a negative selection operator , 2001, Proceedings of the 2001 Congress on Evolutionary Computation (IEEE Cat. No.01TH8546).
[17] Robert C. Green,et al. Artificial immune system based intrusion detection in a distributed hierarchical network architecture of smart grid , 2011, 2011 IEEE Power and Energy Society General Meeting.
[18] Jin Cao,et al. An Automata Based Intrusion Detection Method for Internet of Things , 2017, Mob. Inf. Syst..
[19] Ben Rothke,et al. Network Security: The Complete Reference , 2003 .
[20] Ahmed Al-Saffar,et al. Feature Adaptive and Cyclic Dynamic Learning Based on Infinite Term Memory Extreme Learning Machine , 2019, Applied Sciences.
[21] Pei-Chann Chang,et al. A population-based incremental learning approach with artificial immune system for network intrusion detection , 2016, Eng. Appl. Artif. Intell..
[22] Tian-Syung Lan,et al. Optimization of Machining Parameters Using Fuzzy Taguchi Method for Reducing Tool Wear , 2018, Applied Sciences.
[23] Zafar Sultan. Multiple Simultaneous Threat Detection in UNIX Environment , 2009 .