A comparative analysis of artificial neural network technologies in intrusion detection systems
暂无分享,去创建一个
[1] Silvana Castano,et al. Database Security , 1997, IFIP Advances in Information and Communication Technology.
[2] D. Hammerstrom,et al. Neural networks at work , 1993, IEEE Spectrum.
[3] Dorothy E. Denning,et al. An Intrusion-Detection Model , 1986, 1986 IEEE Symposium on Security and Privacy.
[4] Limin Fu. A neural network model for learning rule-based systems , 1992, [Proceedings 1992] IJCNN International Joint Conference on Neural Networks.
[5] James A. Mahaffey,et al. Multiple Self-Organizing Maps for Intrusion Detection , 2000 .
[6] Todd L. Heberlein,et al. Network intrusion detection , 1994, IEEE Network.
[7] Risto Miikkulainen,et al. Intrusion Detection with Neural Networks , 1997, NIPS.
[8] T.F. Lunt,et al. Real-time intrusion detection , 1989, Digest of Papers. COMPCON Spring 89. Thirty-Fourth IEEE Computer Society International Conference: Intellectual Leverage.
[9] James Cannady,et al. Artificial Neural Networks for Misuse Detection , 1998 .
[10] Cannady,et al. Next Generation Intrusion Detection: Autonomous Reinforcement Learning of Network Attacks , 2000 .
[11] Paul G. Spirakis,et al. Intrusion detection: Approach and performance issues of the SECURENET system , 1994, Comput. Secur..