Intelligent Adaptive Intrusion Detection Systems Using Neural Networks ( Comparitive study )
暂无分享,去创建一个
[1] Alfonso Valdes,et al. Next-generation Intrusion Detection Expert System (NIDES)A Summary , 1997 .
[2] Limin Fu. A neural network model for learning rule-based systems , 1992, [Proceedings 1992] IJCNN International Joint Conference on Neural Networks.
[3] Kymie M. C. Tan,et al. Detection and classification of TCP/IP network services , 1997, Proceedings 13th Annual Computer Security Applications Conference.
[4] Paul G. Spirakis,et al. Intrusion detection: Approach and performance issues of the SECURENET system , 1994, Comput. Secur..
[5] Biswanath Mukherjee,et al. A Software Platform for Testing Intrusion Detection Systems , 1997, IEEE Softw..
[6] K. Tan,et al. The application of neural networks to UNIX computer security , 1995, Proceedings of ICNN'95 - International Conference on Neural Networks.
[7] Eugene H. Spafford,et al. A PATTERN MATCHING MODEL FOR MISUSE INTRUSION DETECTION , 1994 .
[8] Hervé Debar,et al. A neural network component for an intrusion detection system , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.
[9] Todd L. Heberlein,et al. Network intrusion detection , 1994, IEEE Network.
[10] T.F. Lunt,et al. Real-time intrusion detection , 1989, Digest of Papers. COMPCON Spring 89. Thirty-Fourth IEEE Computer Society International Conference: Intellectual Leverage.
[11] Sandeep Kumar,et al. A Software Architecture to Support Misuse Intrusion Detection , 1995 .
[12] Udo W. Pooch,et al. Cooperating security managers: a peer-based intrusion detection system , 1996, IEEE Netw..
[13] Dorothy E. Denning,et al. An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.
[14] Koral Ilgun,et al. USTAT: a real-time intrusion detection system for UNIX , 1993, Proceedings 1993 IEEE Computer Society Symposium on Research in Security and Privacy.
[15] Peter G. Neumann,et al. EMERALD: Event Monitoring Enabling Responses to Anomalous Live Disturbances , 1997, CCS 2002.
[16] Arpad Kelemen,et al. Time lagged recurrent neural network for temporal gene expression classification , 2009, CI 2009.
[17] Michael J. Cramer. New Methods of Intrusion Detection using Control-Loop Measurement , 1995 .
[18] Paul Helman,et al. Statistical Foundations of Audit Trail Analysis for the Detection of Computer Misuse , 1993, IEEE Trans. Software Eng..
[19] Stephen Grossberg,et al. A massively parallel architecture for a self-organizing neural pattern recognition machine , 1988, Comput. Vis. Graph. Image Process..