INTRUSION DETECTION BY BACKPROPAGATION NEURAL NETWORKS WITH SAMPLE-QUERY AND ATTRIBUTE-QUERY
暂无分享,去创建一个
Ray-I Chang | L Lai | W Su | J. Kouh | Ray-I Chang | Liang-Bin Lai | Wenhung Su | Jen-Chieh Wang
[1] Leslie G. Valiant,et al. A theory of the learnable , 1984, STOC '84.
[2] Robert K. Cunningham,et al. Improving Intrusion Detection Performance using Keyword Selection and Neural Networks , 2000, Recent Advances in Intrusion Detection.
[3] Hervé Debar,et al. An application of a recurrent network to an intrusion detection system , 1992, [Proceedings 1992] IJCNN International Joint Conference on Neural Networks.
[4] Risto Miikkulainen,et al. Intrusion Detection with Neural Networks , 1997, NIPS.
[5] Ray-I Chang. Disease Diagnosis Using Query-Based Neural Networks , 2005, ISNN.
[6] Tim Oates,et al. The Effects of Training Set Size on Decision Tree Complexity , 1997, ICML.
[7] Anup K. Ghosh,et al. A Study in Using Neural Networks for Anomaly and Misuse Detection , 1999, USENIX Security Symposium.
[8] Li Jun,et al. HIDE: a Hierarchical Network Intrusion Detection System Using Statistical Preprocessing and Neural Network Classification , 2001 .
[9] Jenq-Neng Hwang,et al. Query-based learning applied to partially trained multilayer perceptrons , 1991, IEEE Trans. Neural Networks.
[10] Hervé Debar,et al. A neural network component for an intrusion detection system , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.
[11] Pei-Yung Hsiao,et al. Unsupervised query-based learning of neural networks using selective-attention and self-regulation , 1997, IEEE Trans. Neural Networks.
[12] James Cannady,et al. Artificial Neural Networks for Misuse Detection , 1998 .