Anomaly Detection in Data Mining using Fuzzy C-Means Technique and Artificial Neural Network
暂无分享,去创建一个
[1] Lance Sherry,et al. Anomaly detection in aircraft data using Recurrent Neural Networks (RNN) , 2016, 2016 Integrated Communications Navigation and Surveillance (ICNS).
[2] Jian Ma,et al. A new approach to intrusion detection using Artificial Neural Networks and fuzzy clustering , 2010, Expert Syst. Appl..
[3] Varun Chandola,et al. TR 09-004 Detecting Anomalies in a Time Series Database , 2009 .
[4] Bart Baesens,et al. New Trends in Data Mining , 2005 .
[5] Santosh Kumar,et al. Genetic Algorithms in Intrusion Detection Systems: A Survey , 2014 .
[6] Swati Paliwal,et al. Denial-of-Service, Probing & Remote to User (R2L) Attack Detection using Genetic Algorithm , 2012 .
[7] Teh Ying Wah,et al. Effective Clustering of Time-Series Data Using FCM , 2014 .
[8] Salvatore J. Stolfo,et al. JAM: Java Agents for Meta-Learning over Distributed Databases , 1997, KDD.
[9] Usman Ahmed,et al. Host based intrusion detection using RBF neural networks , 2009, 2009 International Conference on Emerging Technologies.
[10] Nuno Constantino Castro,et al. Time Series Data Mining , 2009, Encyclopedia of Database Systems.
[11] S. N. Pawar,et al. Anomaly based IDS using Backpropagation Neural Network , 2016 .
[12] Itzhak Levin,et al. KDD-99 classifier learning contest LLSoft's results overview , 2000, SKDD.
[13] Monica Mehrotra,et al. Design Network Intrusion Detection System using hybrid Fuzzy-Neural Network , 2010 .
[14] Marc Dacier,et al. A revised taxonomy for intrusion-detection systems , 2000, Ann. des Télécommunications.
[15] Monis Akhlaq,et al. Snort Performance Evaluation , 2009 .
[16] Vladimir A. Golovko,et al. Neural network approach to real-time network intrusion detection and recognition , 2011, Proceedings of the 6th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems.
[17] Jung-Min Park,et al. An overview of anomaly detection techniques: Existing solutions and latest technological trends , 2007, Comput. Networks.
[18] Tetiana Gladkykh,et al. Fuzzy logic inference for unsupervised anomaly detection , 2016, 2016 IEEE First International Conference on Data Stream Mining & Processing (DSMP).
[19] M. Mahajan,et al. Performance Comparison of Fuzzy C Means with Respect to Other Clustering Algorithm , 2014 .
[20] Witold Pedrycz,et al. Anomaly detection in time series data using a fuzzy c-means clustering , 2013, 2013 Joint IFSA World Congress and NAFIPS Annual Meeting (IFSA/NAFIPS).
[21] VARUN CHANDOLA,et al. Anomaly detection: A survey , 2009, CSUR.
[22] Ying Wang,et al. An Anomaly Detection Method Based on Fuzzy C-means Clustering Algorithm , 2010 .
[23] Limsoon Wong,et al. DATA MINING TECHNIQUES , 2003 .
[24] Swain Sunita,et al. A Hybrid Approach of Intrusion Detection using ANN and FCM , 2016 .
[25] Zurina Mohd Hanapi,et al. Hybrid of fuzzy Clustering Neural Network over NSL Dataset for Intrusion Detection System , 2013, J. Comput. Sci..
[26] Victoria J. Hodge,et al. A Survey of Outlier Detection Methodologies , 2004, Artificial Intelligence Review.
[27] Sugata Sanyal,et al. Adaptive neuro-fuzzy intrusion detection systems , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..
[28] Asmaa Shaker Ashoor. Importance of Intrusion Detection System ( IDS ) , 2010 .
[29] D. P. Gaikwad,et al. Anomaly Based Intrusion Detection System Using Artificial Neural Network and Fuzzy Clustering , 2012 .
[30] Vaishali Kolhe,et al. Hybrid Approach for Classification using Multilevel Fuzzy Min-Max Neural Network , 2016 .