暂无分享,去创建一个
[1] Sara Matzner,et al. An application of machine learning to network intrusion detection , 1999, Proceedings 15th Annual Computer Security Applications Conference (ACSAC'99).
[2] Dipankar Dasgupta,et al. Immunity-Based Intrusion Detection System: A General Framework , 1999 .
[3] Christin Schäfer,et al. Learning Intrusion Detection: Supervised or Unsupervised? , 2005, ICIAP.
[4] Stephanie Forrest,et al. Intrusion Detection Using Sequences of System Calls , 1998, J. Comput. Secur..
[5] Sergio M. Savaresi,et al. Unsupervised learning techniques for an intrusion detection system , 2004, SAC '04.
[6] Wei-Yang Lin,et al. Intrusion detection by machine learning: A review , 2009, Expert Syst. Appl..
[7] Vern Paxson,et al. Outside the Closed World: On Using Machine Learning for Network Intrusion Detection , 2010, 2010 IEEE Symposium on Security and Privacy.
[8] Michael J. Shaw,et al. Genetic algorithms with dynamic niche sharing for multimodal function optimization , 1996, Proceedings of IEEE International Conference on Evolutionary Computation.
[9] Julie Greensmith,et al. Immune system approaches to intrusion detection – a review , 2004, Natural Computing.
[10] Andrew H. Sung,et al. Intrusion detection using neural networks and support vector machines , 2002, Proceedings of the 2002 International Joint Conference on Neural Networks. IJCNN'02 (Cat. No.02CH37290).
[11] Wei Li,et al. Using Genetic Algorithm for Network Intrusion Detection , 2004 .
[12] Karen A. Scarfone,et al. Guide to Intrusion Detection and Prevention Systems (IDPS) , 2007 .
[13] Salvatore J. Stolfo,et al. Data Mining Approaches for Intrusion Detection , 1998, USENIX Security Symposium.
[14] Jonatan Gómez,et al. Evolving Fuzzy Classifiers for Intrusion Detection , 2002 .