An Adaptive Hybrid Multi-level Intelligent Intrusion Detection System for Network Security
暂无分享,去创建一个
[1] Bernhard Pfahringer,et al. Compression-Based Feature Subset Selection , 2007 .
[2] Sushil Jajodia,et al. ADAM: a testbed for exploring the use of data mining in intrusion detection , 2001, SGMD.
[3] James A. Anderson,et al. An Introduction To Neural Networks , 1998 .
[4] Andrew H. Sung,et al. Modeling intrusion detection systems using linear genetic programming approach , 2004 .
[5] Giovanni Vigna,et al. Intrusion detection: a brief history and overview , 2002 .
[6] Ron Kohavi,et al. Targeting Business Users with Decision Table Classifiers , 1998, KDD.
[7] A. Bhavani Sankar,et al. A New Self-Adaptive Neuro Fuzzy Inference System for the Removal of Non-Linear Artifacts from the Respiratory Signal , 2012 .
[8] John McHugh,et al. Defending Yourself: The Role of Intrusion Detection Systems , 2000, IEEE Software.
[9] Andrew H. Sung,et al. Intrusion Detection Systems Using Adaptive Regression Splines , 2004, ICEIS.
[10] Ron Kohavi,et al. The Power of Decision Tables , 1995, ECML.
[11] Emin Anarim,et al. An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks , 2005, Expert Syst. Appl..
[12] M.I. Heywood,et al. Host-based intrusion detection using self-organizing maps , 2002, Proceedings of the 2002 International Joint Conference on Neural Networks. IJCNN'02 (Cat. No.02CH37290).
[13] Ajith Abraham,et al. Intrusion Detection Using Ensemble of Soft Computing Paradigms , 2003 .
[14] Hari Om,et al. A hybrid system for reducing the false alarm rate of anomaly intrusion detection system , 2012, 2012 1st International Conference on Recent Advances in Information Technology (RAIT).
[15] Sugata Sanyal,et al. Adaptive neuro-fuzzy intrusion detection systems , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..
[16] Xiaorong Cheng,et al. A real-time hybrid intrusion detection system based on Principle Component Analysis and Self Organizing Maps , 2010, 2010 Sixth International Conference on Natural Computation.
[17] Rita C. Summers. Secure Computing: Threats and Safeguards , 1996 .
[18] Leonid Portnoy,et al. Intrusion detection with unlabeled data using clustering , 2000 .
[19] Jie Yang,et al. HIDS-DT: An Effective Hybrid Intrusion Detection System Based on Decision Tree , 2010, 2010 International Conference on Communications and Mobile Computing.
[20] Min Xiao,et al. Research and implementation on snort-based hybrid intrusion detection system , 2009, 2009 International Conference on Machine Learning and Cybernetics.
[21] Andrew H. Sung,et al. Intrusion Detection Systems Using Adaptive Regression Splines , 2004, ICEIS.
[22] Ahmad Habibizad Navin,et al. Using Adaptive Neuro-Fuzzy Inference System in Alert Management of Intrusion Detection Systems , 2012 .