Application of artificial neural network in detection of probing attacks
暂无分享,去创建一个
Iftikhar Ahmad | Azween B Abdullah | Abdullah S Alghamdi | A. Abdullah | I. Ahmad | Abdullah S Alghamdi
[1] Adeel Akram,et al. A comparative analysis of artificial neural network technologies in intrusion detection systems , 2006 .
[2] Electronics Letters , 1965, Nature.
[3] Gürsel Serpen,et al. Application of Machine Learning Algorithms to KDD Intrusion Detection Dataset within Misuse Detection Context , 2003, MLMTA.
[4] Yang Wei,et al. Anomaly Intrusion Detection Approach Using Hybrid MLP/CNN Neural Network , 2006, Sixth International Conference on Intelligent Systems Design and Applications.
[5] Dorothy E. Denning,et al. An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.
[6] John McHugh,et al. Testing Intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory , 2000, TSEC.
[7] Azween Abdullah,et al. Artificial neural network approaches to intrusion detection: a review , 2009, IEEE ICT 2009.
[8] James Cannady,et al. Artificial Neural Networks for Misuse Detection , 1998 .
[9] Morteza Amini,et al. RT-UNNID: A practical solution to real-time network-based intrusion detection using unsupervised neural networks , 2006, Comput. Secur..
[10] M. E. Beall. U.S. patent and trademark office , 1997 .
[11] Sergio M. Savaresi,et al. Unsupervised learning techniques for an intrusion detection system , 2004, SAC '04.
[12] Laurene V. Fausett,et al. Fundamentals Of Neural Networks , 1994 .
[13] Iftikhar Ahmad,et al. Performance comparison between backpropagation algorithms applied to intrusion detection in computer network systems , 2008 .
[14] Yen-Chung Huang,et al. 1.5 V large-driving class-AB buffer amplifier with quiescent current control , 2004 .
[15] Julie Greensmith,et al. Immune system approaches to intrusion detection – a review , 2004, Natural Computing.
[16] Y. Tanabe,et al. Local Positioning with Artificial Neural Network and Time of Arrival Technique , 2008, 2008 3rd International Conference on Innovative Computing Information and Control.
[17] W.L.A. Neves,et al. Comparison between backpropagation and RPROP algorithms applied to fault classification in transmission lines , 2004, 2004 IEEE International Joint Conference on Neural Networks (IEEE Cat. No.04CH37541).
[18] Erland Jonsson,et al. Recent Advances in Intrusion Detection: 7th International Symposium, RAID 2004 , 2004 .
[19] C. Douligeris,et al. Detecting denial of service attacks using emergent self-organizing maps , 2005, Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology, 2005..
[20] Elizabeth B. Lennon. Testing Intrusion Detection Systems , 2003 .