A Comprehensive Analysis and study in Intrusion Detection System using Data Mining Techniques
暂无分享,去创建一个
[1] Václav Snásel,et al. Survey: Using Genetic Algorithm Approach in Intrusion Detection Systems Techniques , 2008, 2008 7th Computer Information Systems and Industrial Management Applications.
[2] Risto Miikkulainen,et al. Intrusion Detection with Neural Networks , 1997, NIPS.
[3] Ali A. Ghorbani,et al. A detailed analysis of the KDD CUP 99 data set , 2009, 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications.
[4] Vera Marinova-Boncheva,et al. A Short Survey of Intrusion Detection Systems , 2007 .
[5] Taeshik Shon,et al. A hybrid machine learning approach to network anomaly detection , 2007, Inf. Sci..
[6] Marjorie V. Batey,et al. AUTHORS. IN PROFILE , 1969 .
[7] A. El-Semary,et al. Applying Data Mining of Fuzzy Association Rules to Network Intrusion Detection , 2006, 2006 IEEE Information Assurance Workshop.
[8] Boleslaw K. Szymanski,et al. NETWORK-BASED INTRUSION DETECTION USING NEURAL NETWORKS , 2002 .
[9] Jian-Jun Li,et al. Intrusion detection based on clustering genetic algorithm , 2005, 2005 International Conference on Machine Learning and Cybernetics.
[10] R. Shanmugavadivu. NETWORK INTRUSION DETECTION SYSTEM USING FUZZY LOGIC , 2011 .
[11] Marcos M. Campos,et al. Creation and deployment of data mining-based intrusion detection systems in Oracle Database l0g , 2005, Fourth International Conference on Machine Learning and Applications (ICMLA'05).
[12] M. Sadiq Ali Khan,et al. Rule based Network Intrusion Detection using Genetic Algorithm , 2011 .
[13] Dewan Md. Farid,et al. Anomaly Network Intrusion Detection Based on Improved Self Adaptive Bayesian Algorithm , 2010, J. Comput..
[14] Mohammad Reza Norouzian,et al. Classifying attacks in a network intrusion detection system based on artificial neural networks , 2011, 13th International Conference on Advanced Communication Technology (ICACT2011).
[15] S. Sathya Bama,et al. Network Intrusion Detection using Clustering: A Data Mining Approach , 2011 .
[16] Andrew H. Sung,et al. Intrusion detection using an ensemble of intelligent paradigms , 2005, J. Netw. Comput. Appl..
[17] Kumar Shrivastava Shailendra,et al. Effective Anomaly based Intrusion Detection using Rough Set Theory and Support Vector Machine , 2011 .
[18] H. S. Teng,et al. Adaptive real-time anomaly detection using inductively generated sequential patterns , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.
[19] Venu Govindaraju,et al. Data mining for intrusion detection: techniques, applications and systems , 2004, Proceedings. 20th International Conference on Data Engineering.
[20] Dorothy E. Denning,et al. An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.