An Competent Intrusion Detection System using Relevance Vector Machine
暂无分享,去创建一个
[1] Lilly Suriani Affendey,et al. Intrusion detection using data mining techniques , 2010, 2010 International Conference on Information Retrieval & Knowledge Management (CAMP).
[2] Vivek K. Kshirsagar,et al. Intrusion Detection System using Genetic Algorithm and Data Mining: An Overview , 2012 .
[3] Jerzy W. Rozenblit,et al. Alert Fusion for a Computer Host Based Intrusion Detection System , 2007, 14th Annual IEEE International Conference and Workshops on the Engineering of Computer-Based Systems (ECBS'07).
[4] Stefan Axelsson. Research in Intrusion-Detection Systems: A Survey , 1998 .
[5] Boleslaw K. Szymanski,et al. Host-Based Intrusion Detection Using User Signatures , 2002 .
[6] Rensheng Wang,et al. Search Strategy Optimization for Intruder Detection , 2007, IEEE Sensors Journal.
[7] Marc Dacier,et al. Intrusion detection , 1999, Comput. Networks.
[8] David J. Marchette. A Statistical Method for Profiling Network Traffic , 1999, Workshop on Intrusion Detection and Network Monitoring.
[9] Alfonso Valdes,et al. Next-generation Intrusion Detection Expert System (NIDES)A Summary , 1997 .
[10] Richard A. Kemmerer,et al. State Transition Analysis: A Rule-Based Intrusion Detection Approach , 1995, IEEE Trans. Software Eng..
[11] Joseph G. Tront,et al. Internet Security: Intrusion Detection and Prevention in Mobile Systems , 2007, 2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07).