Evolving Intrusion Detection Systems
暂无分享,去创建一个
[1] J. Ross Quinlan,et al. C4.5: Programs for Machine Learning , 1992 .
[2] Ajith Abraham,et al. MEPIDS: Multi-Expression Programming for Intrusion Detection System , 2005, IWINAC.
[3] William W. Cohen. Learning Trees and Rules with Set-Valued Features , 1996, AAAI/IAAI, Vol. 1.
[4] Thorsten Joachims,et al. Making large scale SVM learning practical , 1998 .
[5] Phillip A. Porras,et al. STAT -- A State Transition Analysis Tool For Intrusion Detection , 1993 .
[6] Mihai Oltean,et al. Evolving Evolutionary Algorithms Using Multi Expression Programming , 2003, ECAL.
[7] Wolfgang Banzhaf,et al. Explicit Control of Diversity and Effective Variation Distance in Linear Genetic Programming , 2002, EuroGP.
[8] Dorothy E. Denning,et al. An Intrusion-Detection Model , 1986, 1986 IEEE Symposium on Security and Privacy.
[9] Tom Fawcett,et al. Robust Classification for Imprecise Environments , 2000, Machine Learning.
[10] Aiko M. Hormann,et al. Programs for Machine Learning. Part I , 1962, Inf. Control..
[11] Michael O'Neill,et al. Grammatical Evolution: Evolving Programs for an Arbitrary Language , 1998, EuroGP.
[12] A. Abraham,et al. Intrusion Detection Systems Using Decision Trees and Support Vector Machines , 2004 .
[13] Sushil Jajodia,et al. ADAM: a testbed for exploring the use of data mining in intrusion detection , 2001, SGMD.
[14] Eugene H. Spafford,et al. An Application of Pattern Matching in Intrusion Detection , 1994 .
[15] Aurobindo Sundaram,et al. An introduction to intrusion detection , 1996, CROS.
[16] Vladimir Vapnik,et al. The Nature of Statistical Learning , 1995 .
[17] J. Ross Quinlan,et al. Induction of Decision Trees , 1986, Machine Learning.
[18] Mihai Oltean,et al. A Comparison of Several Linear Genetic Programming Techniques , 2003, Complex Syst..
[19] Koral Ilgun,et al. USTAT: a real-time intrusion detection system for UNIX , 1993, Proceedings 1993 IEEE Computer Society Symposium on Research in Security and Privacy.
[20] Sandeep Kumar,et al. Classification and detection of computer intrusions , 1996 .
[21] Arthur B. Maccabe,et al. The architecture of a network level intrusion detection system , 1990 .
[22] Salvatore J. Stolfo,et al. A data mining framework for building intrusion detection models , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).
[23] H. S. Teng,et al. Security audit trail analysis using inductively generated predictive rules , 1990, Sixth Conference on Artificial Intelligence for Applications.
[24] Wolfgang Banzhaf,et al. A comparison of linear genetic programming and neural networks in medical data mining , 2001, IEEE Trans. Evol. Comput..
[25] Vladimir N. Vapnik,et al. The Nature of Statistical Learning Theory , 2000, Statistics for Engineering and Information Science.
[26] Rita C. Summers. Secure Computing: Threats and Safeguards , 1996 .