Using Fuzzy Neural Networks and rule heuristics for anomaly intrusion detection on database connection
暂无分享,去创建一个
[1] Steven Furnell,et al. Insider Threat Prediction Tool: Evaluating the probability of IT misuse , 2002, Comput. Secur..
[2] M.I. Heywood,et al. Host-based intrusion detection using self-organizing maps , 2002, Proceedings of the 2002 International Joint Conference on Neural Networks. IJCNN'02 (Cat. No.02CH37290).
[3] Malcolm I. Heywood,et al. Training genetic programming on half a million patterns: an example from anomaly detection , 2005, IEEE Transactions on Evolutionary Computation.
[4] S. Grossberg,et al. Pattern Recognition by Self-Organizing Neural Networks , 1991 .
[5] Timothy Sherwood,et al. Architectures for Bit-Split String Scanning in Intrusion Detection , 2006, IEEE Micro.
[6] Palma Blonda,et al. A survey of fuzzy clustering algorithms for pattern recognition. I , 1999, IEEE Trans. Syst. Man Cybern. Part B.
[7] Fabio A. González,et al. CIDS: An agent-based intrusion detection system , 2005, Comput. Secur..
[8] Stephen Grossberg,et al. The ART of adaptive pattern recognition by a self-organizing neural network , 1988, Computer.
[9] L. F. Wilson,et al. Analysis of distributed intrusion detection systems using Bayesian methods , 2002, Conference Proceedings of the IEEE International Performance, Computing, and Communications Conference (Cat. No.02CH37326).
[10] Won Suk Lee,et al. An anomaly intrusion detection method by clustering normal user behavior , 2003, Comput. Secur..
[11] E. Eugene Schultz. A framework for understanding and predicting insider attacks , 2002, Comput. Secur..