Survey on Intrusion Detection System using Machine Learning Techniques
暂无分享,去创建一个
[1] Xinghuo Yu,et al. A simple and efficient hidden Markov model scheme for host-based anomaly intrusion detection , 2009, IEEE Network.
[2] Cheng Xiang,et al. Design of Multiple-Level Hybrid Classifier for Intrusion Detection System , 2005, 2005 IEEE Workshop on Machine Learning for Signal Processing.
[3] Hilary H. Hosmer,et al. Security is fuzzy!: applying the fuzzy logic paradigm to the multipolicy paradigm , 1993, NSPW '92-93.
[4] Qin Zhi,et al. The application of Hybrid Neural Network Algorithms in Intrusion Detection System , 2011, 2011 International Conference on E-Business and E-Government (ICEE).
[5] Peng Ning,et al. Reasoning about complementary intrusion evidence , 2004, 20th Annual Computer Security Applications Conference.
[6] Jaideep Srivastava,et al. Managing Cyber Threats: Issues, Approaches, and Challenges (Massive Computing) , 2005 .
[7] Jiankun Hu,et al. A program-based anomaly intrusion detection scheme using multiple detection engines and fuzzy inference , 2009, J. Netw. Comput. Appl..
[8] David Heckerman,et al. A Tutorial on Learning with Bayesian Networks , 1999, Innovations in Bayesian Networks.
[9] Sushil Jajodia,et al. ADAM: Detecting Intrusions by Data Mining , 2001 .
[10] Susan M. Bridges,et al. FUZZY DATA MINING AND GENETIC ALGORITHMS APPLIED TO INTRUSION DETECTION , 2002 .
[11] Rebecca Gurley Bace,et al. Intrusion Detection , 2018, Encyclopedia of Social Network Analysis and Mining. 2nd Ed..
[12] Julie A. Dickerson,et al. Fuzzy network profiling for intrusion detection , 2000, PeachFuzz 2000. 19th International Conference of the North American Fuzzy Information Processing Society - NAFIPS (Cat. No.00TH8500).
[13] Wladyslaw Homenda,et al. Computer Information Systems and Industrial Management , 2015, Lecture Notes in Computer Science.
[14] Wei Lu,et al. Unsupervised anomaly detection using an evolutionary extension of k-means algorithm , 2008, Int. J. Inf. Comput. Secur..
[15] Taghi M. Khoshgoftaar,et al. Active learning with neural networks for intrusion detection , 2010, 2010 IEEE International Conference on Information Reuse & Integration.
[16] Ajith Abraham,et al. Feature deduction and ensemble design of intrusion detection systems , 2005, Comput. Secur..
[17] Wei Li,et al. Using Genetic Algorithm for Network Intrusion Detection , 2004 .
[18] Salvatore J. Stolfo,et al. A framework for constructing features and models for intrusion detection systems , 2000, TSEC.
[19] H. Javitz,et al. Detecting Unusual Program Behavior Using the Statistical Component of the Next-generation Intrusion Detection Expert System ( NIDES ) 1 , 1997 .
[20] A. Murali,et al. A Survey on Intrusion Detection Approaches , 2005, 2005 International Conference on Information and Communication Technologies.
[21] Dorothy E. Denning,et al. An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.
[22] Qiang Chen,et al. Multivariate Statistical Analysis of Audit Trails for Host-Based Intrusion Detection , 2002, IEEE Trans. Computers.
[23] Václav Snásel,et al. Survey: Using Genetic Algorithm Approach in Intrusion Detection Systems Techniques , 2008, 2008 7th Computer Information Systems and Industrial Management Applications.
[24] Xiangmei Li. Optimization of the Neural-Network-Based Multiple Classifiers Intrusion Detection System , 2010, 2010 International Conference on Internet Technology and Applications.
[25] Manas Ranjan Patra,et al. NETWORK INTRUSION DETECTION USING NAÏVE BAYES , 2007 .
[26] Elisa Bertino,et al. Design and Implementation of an Intrusion Response System for Relational Databases , 2011, IEEE Transactions on Knowledge and Data Engineering.