Neural Network based Intrusion Detection System for critical infrastructures
暂无分享,去创建一个
[1] D. Marquardt. An Algorithm for Least-Squares Estimation of Nonlinear Parameters , 1963 .
[2] Dorothy E. Denning,et al. An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.
[3] Hervé Debar,et al. An application of a recurrent network to an intrusion detection system , 1992, [Proceedings 1992] IJCNN International Joint Conference on Neural Networks.
[4] Paul J. Werbos,et al. The roots of backpropagation , 1994 .
[5] Richard A. Kemmerer,et al. State Transition Analysis: A Rule-Based Intrusion Detection Approach , 1995, IEEE Trans. Software Eng..
[6] Risto Miikkulainen,et al. Intrusion Detection with Neural Networks , 1997, NIPS.
[7] Philip K. Chan,et al. Learning Patterns from Unix Process Execution Traces for Intrusion Detection , 1997 .
[8] Anup K. Ghosh,et al. Detecting anomalous and unknown intrusions against programs , 1998, Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217).
[9] Michael Schatz,et al. Learning Program Behavior Profiles for Intrusion Detection , 1999, Workshop on Intrusion Detection and Network Monitoring.
[10] Hyung Seok Kim,et al. Design Of Networks For Distributed Digital Control Systems In Nuclear Power Plants , 2000 .
[11] Ian Witten,et al. Data Mining , 2000 .
[12] Leonid Portnoy,et al. Intrusion detection with unlabeled data using clustering , 2000 .
[13] Dana A. Shea. Critical Infrastructure: Control Systems and the Terrorist Threat [Updated April 23, 2003] , 2003 .
[14] T.,et al. Training Feedforward Networks with the Marquardt Algorithm , 2004 .
[15] Kien A. Hua,et al. Decision tree classifier for network intrusion detection with GA-based feature selection , 2005, ACM Southeast Regional Conference.
[16] Qiang Wang,et al. A clustering algorithm for intrusion detection , 2005, SPIE Defense + Commercial Sensing.
[17] Dayu Yang,et al. Anomaly-Based Intrusion Detection for SCADA Systems , 2006 .
[18] Taghi M. Khoshgoftaar,et al. CLUSTERING-BASED NETWORK INTRUSION DETECTION , 2007 .