Artificial Immune System Inspired Intrusion Detection System Using Genetic Algorithm
暂无分享,去创建一个
[1] Ole J Mengshoel,et al. The Crowding Approach to Niching in Genetic Algorithms , 2008, Evolutionary Computation.
[2] Václav Snásel,et al. Survey: Using Genetic Algorithm Approach in Intrusion Detection Systems Techniques , 2008, 2008 7th Computer Information Systems and Industrial Management Applications.
[3] Gabriel Maciá-Fernández,et al. Anomaly-based network intrusion detection: Techniques, systems and challenges , 2009, Comput. Secur..
[4] D. Dasgupta,et al. Advances in artificial immune systems , 2006, IEEE Computational Intelligence Magazine.
[5] Md. Abu Naser Bikas,et al. An Implementation of Intrusion Detection System Using Genetic Algorithm , 2012, ArXiv.
[6] Wolfgang Banzhaf,et al. The use of computational intelligence in intrusion detection systems: A review , 2010, Appl. Soft Comput..
[7] Amedeo Napoli,et al. Two FCA-Based Methods for Mining Gene Expression Data , 2009, ICFCA.
[8] Fabio A. González,et al. An immunity-based technique to characterize intrusions in computer networks , 2002, IEEE Trans. Evol. Comput..
[9] Fan Li. Hybrid Neural Network Intrusion Detection System Using Genetic Algorithm , 2010, 2010 International Conference on Multimedia Technology.
[10] Varun Chandola,et al. Anomaly detection for symbolic sequences and time series data , 2009 .
[11] Wei Li,et al. Using Genetic Algorithm for Network Intrusion Detection , 2004 .
[12] M. Sadiq Ali Khan,et al. Rule based Network Intrusion Detection using Genetic Algorithm , 2011 .
[13] Macia-FernandezG.,et al. Anomaly-based network intrusion detection , 2009 .
[14] G. Maciá-Fernández,et al. Anomaly-based network intrusion detection: Techniques, systems and challenges , 2009, Comput. Secur..
[15] Giovanni Vigna,et al. Intrusion detection: a brief history and overview , 2002 .
[16] Wei Lu,et al. Detecting New Forms of Network Intrusion Using Genetic Programming , 2004, Comput. Intell..
[17] Jan H. P. Eloff,et al. An approach to implement a network intrusion detection system using genetic algorithms , 2004 .
[18] Richard Cole,et al. Using Conceptual Scaling In Formal Concept Analysis For Knowledge And Data Discovery In Medical Text , 1998 .
[19] Hossein Shirazi,et al. An Intelligent Intrusion Detection System Using Genetic Algorithms and Features Selection , 2010 .
[20] Graham Kendall,et al. Search Methodologies: Introductory Tutorials in Optimization and Decision Support Techniques , 2013 .
[21] Reyadh Naoum,et al. Fitness Function for Genetic Algorithm used in Intrusion Detection System , 2012 .
[22] Tarek S. Sobh,et al. A cooperative immunological approach for detecting network anomaly , 2011, Appl. Soft Comput..
[23] Vivek K. Kshirsagar,et al. Intrusion Detection System using Genetic Algorithm and Data Mining: An Overview , 2012 .
[24] Aboul Ella Hassanien,et al. Detectors generation using genetic algorithm for a negative selection inspired anomaly network intrusion detection system , 2012, 2012 Federated Conference on Computer Science and Information Systems (FedCSIS).
[25] Fernando Niño,et al. Recent Advances in Artificial Immune Systems: Models and Applications , 2011, Appl. Soft Comput..
[26] Jonathan Timmis,et al. Artificial Immune Systems: A New Computational Intelligence Approach , 2003 .
[27] Anup Goyal,et al. GA-NIDS : A Genetic Algorithm based Network Intrusion Detection System , 2007 .
[28] Ali A. Ghorbani,et al. A detailed analysis of the KDD CUP 99 data set , 2009, 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications.