Comparison of BPL and RBF Network in Intrusion Detection System
暂无分享,去创建一个
[1] James Cannady,et al. Artificial Neural Networks for Misuse Detection , 1998 .
[2] Cannady,et al. Next Generation Intrusion Detection: Autonomous Reinforcement Learning of Network Attacks , 2000 .
[3] Risto Miikkulainen,et al. Intrusion Detection with Neural Networks , 1997, NIPS.
[4] Salvatore J. Stolfo,et al. Using artificial anomalies to detect unknown and known network intrusions , 2003, Knowledge and Information Systems.
[5] Anup K. Ghosh,et al. Detecting anomalous and unknown intrusions against programs , 1998, Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217).
[6] Anita K. Jones,et al. Computer System Intrusion Detection: A Survey , 2000 .
[7] Salvatore J. Stolfo,et al. Cost-based modeling for fraud and intrusion detection: results from the JAM project , 2000, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.
[8] Robert S. Sielken. Application Intrusion Detection , 1999 .