Adaptive Intrusion Detection Systems: The Next Generation of IDSs
暂无分享,去创建一个
[1] James Cannady. Applying CMAC-based online learning to intrusion detection , 2000, Proceedings of the IEEE-INNS-ENNS International Joint Conference on Neural Networks. IJCNN 2000. Neural Computing: New Challenges and Perspectives for the New Millennium.
[2] Duminda Wijesekera,et al. Modern Intrusion Detection, Data Mining, and Degrees of Attack Guilt , 2002, Applications of Data Mining in Computer Security.
[3] Cannady,et al. Next Generation Intrusion Detection: Autonomous Reinforcement Learning of Network Attacks , 2000 .
[4] Zhang Yi,et al. A hierarchical intrusion detection model based on the PCA neural networks , 2007, Neurocomputing.
[5] Andrew H. Sung,et al. Intrusion detection using an ensemble of intelligent paradigms , 2005, J. Netw. Comput. Appl..
[6] Salvatore J. Stolfo,et al. Real time data mining-based intrusion detection , 2001, Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01.
[7] Salvatore J. Stolfo,et al. Adaptive Intrusion Detection: A Data Mining Approach , 2000, Artificial Intelligence Review.
[8] Salvatore J. Stolfo,et al. Adaptive Model Generation , 2002, Applications of Data Mining in Computer Security.
[9] Salvatore J. Stolfo,et al. Data Mining Approaches for Intrusion Detection , 1998, USENIX Security Symposium.
[10] Mohammad Zulkernine,et al. Network Intrusion Detection using Random Forests , 2005, PST.
[11] Salvatore J. Stolfo,et al. Adaptive Model Generation for Intrusion Detection Systems , 2000 .
[12] Eugene H. Spafford,et al. An Application of Pattern Matching in Intrusion Detection , 1994 .
[13] Walter D. Potter,et al. A Blackboard-Based Learning Intrusion Detection System: A New Approach , 2003, IEA/AIE.
[14] Erland Jonsson,et al. Using active learning in intrusion detection , 2004, Proceedings. 17th IEEE Computer Security Foundations Workshop, 2004..
[15] Chunlin Zhang,et al. Intrusion detection using hierarchical neural networks , 2005, Pattern Recognit. Lett..
[16] M. Bouaziz,et al. An Introduction to Computer Security , 2012 .
[17] John McHugh,et al. Defending Yourself: The Role of Intrusion Detection Systems , 2000, IEEE Software.
[18] Ali A. Ghorbani,et al. A detailed analysis of the KDD CUP 99 data set , 2009, 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications.
[19] Hassina Bensefia,et al. Towards an Adaptive Intrusion Detection System: A Critical and Comparative Study , 2008, 2008 International Conference on Computational Intelligence and Security.
[20] Xin Xu. Adaptive Intrusion Detection Based on Machine Learning: Feature Extraction, Classifier Construction and Sequential Pattern Prediction , 2006 .
[21] Khaled Labib. Computer security and intrusion detection , 2004, CROS.
[22] Dorothy E. Denning,et al. An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.
[23] Jaideep Srivastava,et al. Intrusion Detection: A Survey , 2005 .
[24] Nong Ye,et al. An attack-norm separation approach for detecting cyber attacks , 2006, Inf. Syst. Frontiers.
[25] Malcolm I. Heywood,et al. Selecting Features for Intrusion Detection: A Feature Relevance Analysis on KDD 99 , 2005, PST.
[26] Sushil Jajodia,et al. Data warehousing and data mining techniques for intrusion detection systems , 2006, Distributed and Parallel Databases.
[27] Marc Dacier,et al. Towards a taxonomy of intrusion-detection systems , 1999, Comput. Networks.
[28] John McHugh,et al. Testing Intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory , 2000, TSEC.