NEURAL NETWORK APPROACHES FOR INTRUSION DETECTION AND RECOGNITION
暂无分享,去创建一个
[1] Erkki Oja,et al. Principal components, minor components, and linear neural networks , 1992, Neural Networks.
[2] Wei Zhang,et al. A genetic clustering method for intrusion detection , 2004, Pattern Recognit..
[3] Sandeep Kumar,et al. A Software Architecture to Support Misuse Intrusion Detection , 1995 .
[4] A.N. Zincir-Heywood,et al. On the capability of an SOM based intrusion detection system , 2003, Proceedings of the International Joint Conference on Neural Networks, 2003..
[5] Dorothy E. Denning,et al. An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.
[6] Salvatore J. Stolfo,et al. A data mining framework for building intrusion detection models , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).
[7] Zheng Zhang,et al. HIDE : a Hierarchical Network Intrusion Detection System Using Statistical Preprocessing and Neural Network Classification , 2001 .
[8] Richard A. Kemmerer,et al. State Transition Analysis: A Rule-Based Intrusion Detection Approach , 1995, IEEE Trans. Software Eng..
[9] M. Shyu,et al. A Novel Anomaly Detection Scheme Based on Principal Component Classifier , 2003 .
[10] Salvatore J. Stolfo,et al. A framework for constructing features and models for intrusion detection systems , 2000, TSEC.