On the capability of an SOM based intrusion detection system
暂无分享,去创建一个
A.N. Zincir-Heywood | M.I. Heywood | H.G. Kayacik | H. Kayacik | A. N. Zincir-Heywood | M. Heywood | H. G. Kayacik
[1] Stephen L. Chiu,et al. Fuzzy Model Identification Based on Cluster Estimation , 1994, J. Intell. Fuzzy Syst..
[2] Salvatore J. Stolfo,et al. A data mining framework for building intrusion detection models , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).
[3] John McHugh,et al. Testing Intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory , 2000, TSEC.
[4] Tim Bass,et al. Intrusion detection systems and multisensor data fusion , 2000, CACM.
[5] Eleazar Eskin,et al. A GEOMETRIC FRAMEWORK FOR UNSUPERVISED ANOMALY DETECTION: DETECTING INTRUSIONS IN UNLABELED DATA , 2002 .
[6] Salvatore J. Stolfo,et al. A Geometric Framework for Unsupervised Anomaly Detection , 2002, Applications of Data Mining in Computer Security.
[7] M.I. Heywood,et al. Host-based intrusion detection using self-organizing maps , 2002, Proceedings of the 2002 International Joint Conference on Neural Networks. IJCNN'02 (Cat. No.02CH37290).