Real-time multi-agent system for an adaptive intrusion detection system
暂无分享,去创建一个
Wathiq Laftah Al-Yaseen | Zulaiha Ali Othman | Mohd Zakree Ahmad Nazri | Z. Othman | M. Nazri | W. L. Al-Yaseen
[1] Susan M. Bridges,et al. A FRAMEWORK FOR AN ADAPTIVE INTRUSION DETECTION SYSTEM WITH DATA MINING , 2001 .
[2] Hassan Bevrani,et al. Multi-agent systems in control engineering: a survey , 2009 .
[3] Jianming Fu,et al. A Framework for Adaptive Anomaly Detection Based on Support Vector Data Description , 2004, NPC.
[4] A. K. Mousa,et al. Comment on “On Soft β-Open Sets and Soft β-Continuous Functions” , 2015, TheScientificWorldJournal.
[5] A. Kannan,et al. An Intrusion Detection System Based on Multiple Level Hybrid Classifier using Enhanced C4.5 , 2008, 2008 International Conference on Signal Processing, Communications and Networking.
[6] Shi-Jinn Horng,et al. A novel intrusion detection system based on hierarchical clustering and support vector machines , 2011, Expert Syst. Appl..
[7] Harish Kumar,et al. An intrusion detection system using network traffic profiling and online sequential extreme learning machine , 2015, Expert Syst. Appl..
[8] Charles Elkan,et al. Results of the KDD'99 classifier learning , 2000, SKDD.
[9] Mohamed Ben Ahmed,et al. A Framework for an Adaptive Intrusion Detection System using Bayesian Network , 2007, 2007 IEEE Intelligence and Security Informatics.
[10] Mohamed A. Shaheen,et al. Adaptive Layered Approach using Machine Learning Techniques with Gain Ratio for Intrusion Detection Systems , 2012, ArXiv.
[11] Prashant J. Shenoy,et al. Agile dynamic provisioning of multi-tier Internet applications , 2008, TAAS.
[12] Gürsel Serpen,et al. Application of Machine Learning Algorithms to KDD Intrusion Detection Dataset within Misuse Detection Context , 2003, MLMTA.
[13] Xu Rongsheng,et al. Modeling Intrusion Detection System by Discovering Association Rule in Rough Set Theory Framework , 2006, 2006 International Conference on Computational Inteligence for Modelling Control and Automation and International Conference on Intelligent Agents Web Technologies and International Commerce (CIMCA'06).
[14] Jugal K. Kalita,et al. MLH-IDS: A Multi-Level Hybrid Intrusion Detection Method , 2014, Comput. J..
[15] Wathiq Laftah Al-Yaseen,et al. Hybrid Modified K-Means with C4.5 for Intrusion Detection Systems in Multiagent Systems. , 2015 .
[16] Md. Abu Naser Bikas,et al. An Implementation of Intrusion Detection System Using Genetic Algorithm , 2012, ArXiv.
[17] Sam Kwong,et al. Genetic-fuzzy rule mining approach and evaluation of feature selection techniques for anomaly intrusion detection , 2007, Pattern Recognition.
[18] Neha Tripathi,et al. A Survey on Intrusion Detection Systems , 2015 .
[19] T. Ambwani,et al. Multi class support vector machine implementation to intrusion detection , 2003, Proceedings of the International Joint Conference on Neural Networks, 2003..
[21] Rayford B. Vaughn,et al. Adaptive intrusion detection with data mining , 2003, SMC'03 Conference Proceedings. 2003 IEEE International Conference on Systems, Man and Cybernetics. Conference Theme - System Security and Assurance (Cat. No.03CH37483).
[22] C. Xiang,et al. Design of mnitiple-level tree classifiers for intrusion detection system , 2004, IEEE Conference on Cybernetics and Intelligent Systems, 2004..
[23] Salvatore J. Stolfo,et al. Real time data mining-based intrusion detection , 2001, Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01.
[24] Chun-Hung Richard Lin,et al. Intrusion detection system: A comprehensive review , 2013, J. Netw. Comput. Appl..
[25] Shoushan Luo,et al. A two-level hybrid approach for intrusion detection , 2016, Neurocomputing.
[26] Mohd Zakree Ahmad Nazri,et al. Hybrid Modified K-Means with C4.5 for Intrusion Detection Systems in Multiagent Systems , 2015, TheScientificWorldJournal.
[27] Hui Lu,et al. Three-Level Hybrid Intrusion Detection System , 2009, 2009 International Conference on Information Engineering and Computer Science.
[28] Bu-Sung Lee,et al. CARRADS: Cross layer based adaptive real-time routing attack detection system for MANETS , 2010, Comput. Networks.
[29] Maghsoud Abbaspour,et al. Adaptive Anomaly-Based Intrusion Detection System Using Fuzzy Controller , 2012, Int. J. Netw. Secur..
[30] Shahaboddin Shamshirband,et al. Co-FAIS: Cooperative fuzzy artificial immune system for detecting intrusion in wireless sensor networks , 2014, J. Netw. Comput. Appl..
[31] L. S. Ng,et al. Expert security system in wireless sensor networks based on fuzzy discussion multi-agent systems , 2010 .
[32] Nor Badrul Anuar,et al. An appraisal and design of a multi-agent system based cooperative wireless intrusion detection computational intelligence technique , 2013, Eng. Appl. Artif. Intell..
[33] Enzo Baccarelli,et al. Energy-efficient dynamic traffic offloading and reconfiguration of networked data centers for big data stream mobile computing: review, challenges, and a case study , 2016, IEEE Network.
[34] Cheng Xiang,et al. Design of Multiple-Level Hybrid Classifier for Intrusion Detection System , 2005, 2005 IEEE Workshop on Machine Learning for Signal Processing.
[35] Wathiq Laftah Al-Yaseen,et al. Intrusion Detection System Based on Modified K-means and Multi-level Support Vector Machines , 2015, SCDS.
[36] V. Rao Vemuri,et al. Adaptive anomaly detection with evolving connectionist systems , 2007, J. Netw. Comput. Appl..
[37] Manel Guerrero Zapata,et al. A fuzzy anomaly detection system based on hybrid PSO-Kmeans algorithm in content-centric networks , 2015, Neurocomputing.
[38] Liang He,et al. An Improved Intrusion Detection based on Neural Network and Fuzzy Algorithm , 2014, J. Networks.
[39] Thomas Weigert,et al. An adaptive automatically tuning intrusion detection system , 2008, TAAS.