暂无分享,去创建一个
[1] Sapna S. Kaushik,et al. Detection of Attacks in an Intrusion Detection System , 2011 .
[2] Mohamed S. Kamel,et al. An aggregated clustering approach using multi-ant colonies algorithms , 2006, Pattern Recognit..
[3] William Stallings. Network Security Essentials: Applications and Standards (3rd Edition) , 2006 .
[4] Vasant Honavar,et al. Automated discovery of concise predictive rules for intrusion detection , 2002, J. Syst. Softw..
[5] S. Janakiraman,et al. ACO based Distributed Intrusion Detection System , 2009, J. Digit. Content Technol. its Appl..
[6] Dewan Md. Farid,et al. Combining Naive Bayes and Decision Tree for Adaptive Intrusion Detection , 2010, ArXiv.
[7] Minjie Zhang,et al. P2P Distributed Intrusion Detections by Using Mobile Agents , 2008, Seventh IEEE/ACIS International Conference on Computer and Information Science (icis 2008).
[8] Su-Ping Chen,et al. INTRUSION DETECTION USING A HYBRID SUPPORT VECTOR MACHINE BASED ON ENTROPY AND TF-IDF , 2008 .
[9] Heejo Lee,et al. On the effectiveness of probabilistic packet marking for IP traceback under denial of service attack , 2001, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213).
[10] A. S. Sodiya,et al. Issue S in Informing Science and Information Technology a Strategic Review of Existing Mobile Agent- Based Intrusion Detection Systems , 2022 .
[12] Paul Francis,et al. Mitigating DNS DoS attacks , 2008, CCS.
[13] Roland Sauerbrey,et al. Biography , 1992, Ann. Pure Appl. Log..
[14] Habiba Drias,et al. Distributed Intrusion Detection Framework based on Autonomous and Mobile Agents , 2006, 2006 International Conference on Dependability of Computer Systems.
[15] William Stallings,et al. Network Security Essentials: Applications and Standards , 1999 .
[16] Lee Garber,et al. Denial-of-Service Attacks Rip the Internet , 2000, Computer.
[17] A. S. Saxena,et al. CONCEIVING AINTRUSION DETECTION SYSTEM IN THE NETWORK BY MOBILEAGENTS , 2011 .
[18] Gouda I. Salama,et al. Performance Evaluation of a Genetic Algorithm Based Approach to Network Intrusion Detection System , 2009 .
[19] Stefan Savage,et al. Inferring Internet denial-of-service activity , 2001, TOCS.
[20] Azizah Abdul Rahman,et al. Dynamic Multi Layer Signature based Intrusion Detection system Using Mobile Agents , 2010, ArXiv.