Intrusion Detection System using Log Files and Reinforcement Learning
暂无分享,去创建一个
[1] Mohamed I. Marie,et al. Web Server Logs Preprocessing for Web Intrusion Detection , 2011, Comput. Inf. Sci..
[2] Xuan Dau Hoang,et al. Data Mining Methods for Network Intrusion Detection , 2004 .
[3] Cannady,et al. New Methods of Intrusion Detection Using Control-Loop Measurement , 1996 .
[4] Sushil Jajodia,et al. Intrusion Detection Techniques , 2004 .
[5] Sebastiaan Tesink,et al. Improving Intrusion Detection Systems through Machine Learning , 2007 .
[6] Cristina L. Abad,et al. Log correlation for intrusion detection: a proof of concept , 2003, 19th Annual Computer Security Applications Conference, 2003. Proceedings..
[7] Koen Vanhoof,et al. Web Usage Mining on Proxy Servers: A Case Study , 2001 .
[8] Michael J. Cramer. New Methods of Intrusion Detection using Control-Loop Measurement , 1995 .
[9] Cuixiao Zhang,et al. A Mixed Unsupervised Clustering-Based Intrusion Detection Model , 2009, 2009 Third International Conference on Genetic and Evolutionary Computing.
[10] Bernard J. Jansen,et al. A Review of Methodologies for Analyzing Websites , 2010 .