The Use of Artificial Intelligence for the Intrusion Detection System in Computer Networks
暂无分享,去创建一个
Carlos Alberto Ochoa Ortíz Zezzatti | Gustavo Arroyo-Figueroa | Blanca Taboada | Miguel Pérez-Ramírez | José Alberto Hernández Aguilar | Santiago Yip Ortuño
[1] Salah Al-Sharhan,et al. ARTIFICIAL IMMUNE SYSTEMS - MODELS, ALGORITHMS AND APPLICATIONS , 2010 .
[2] Zhou Ji,et al. Artificial immune system (AIS) research in the last five years , 2003, The 2003 Congress on Evolutionary Computation, 2003. CEC '03..
[3] Qiao Yan,et al. AINIDS: an immune-based network intrusion detection system , 2006, SPIE Defense + Commercial Sensing.
[4] Luís Torgo,et al. Data Mining with R: Learning with Case Studies , 2010 .
[5] Vincenzo Cutello,et al. Clonal Selection Algorithms: A Comparative Case Study Using Effective Mutation Potentials , 2005, ICARIS.
[6] Isai Rojas González,et al. Bayesian Network Application on Information Security , 2010 .
[7] Salah Al-Sharhan,et al. Advancement in Artificial Immune Systems: A perspective of models, algorithms and applications , 2009, 2009 5th IEEE GCC Conference & Exhibition.
[8] Michael Hilker,et al. SANA - Security Analysis in Internet Traffic through Artificial Immune Systems , 2006, Trustworthy Software.
[9] Li Tao,et al. A self-adaptive negative selection algorithm used for anomaly detection , 2009 .
[10] Alan S. Perelson,et al. The immune system, adaptation, and machine learning , 1986 .
[11] Jiawei Han,et al. Data Mining: Concepts and Techniques , 2000 .
[12] Jonathan Timmis,et al. Artificial Immune Systems: A New Computational Intelligence Approach , 2003 .
[13] Peter J. Bentley,et al. An evaluation of negative selection in an artificial immune system for network intrusion detection , 2001 .
[14] Bruno Lara,et al. Diseño e Implementación de un Sistema de Evaluación Remota con Seguridad Avanzada para Universidades Utilizando Minería de Datos , 2010 .
[15] Itzhak Levin,et al. KDD-99 classifier learning contest LLSoft's results overview , 2000, SKDD.
[16] Raúl Monroy,et al. Formal Support to Security Protocol Development: A Survey , 2008, Computación y Sistemas.
[17] Margaret H. Dunham,et al. Data Mining: Introductory and Advanced Topics , 2002 .