A Novel Fuzzy Min-Max Neural Network and Genetic Algorithm-Based Intrusion Detection System
暂无分享,去创建一个
[1] Patrick K. Simpson,et al. Fuzzy min-max neural networks. I. Classification , 1992, IEEE Trans. Neural Networks.
[2] Zhi-Hua Zhou,et al. NeC4.5: Neural Ensemble Based C4.5 , 2004, IEEE Trans. Knowl. Data Eng..
[3] Zhu Wang,et al. A research using hybrid RBF/Elman neural networks for intrusion detection system secure model , 2009, Comput. Phys. Commun..
[4] Heidar A. Malki,et al. Network Intrusion Detection System Using Neural Networks , 2008, 2008 Fourth International Conference on Natural Computation.
[5] Ingoo Han,et al. The neural network models for IDS based on the asymmetric costs of false negative errors and false positive errors , 2003, Expert Syst. Appl..
[6] Alex Alves Freitas,et al. Evolutionary Algorithms for Data Mining , 2005, The Data Mining and Knowledge Discovery Handbook.
[7] Bernhard Pfahringer,et al. Winning the KDD99 classification cup: bagged boosting , 2000, SKDD.
[8] Ali A. Ghorbani,et al. Improved competitive learning neural networks for network intrusion and fraud detection , 2012, Neurocomputing.
[9] P. K. Simpson,et al. Fuzzy min-max neural networks , 1991, [Proceedings] 1991 IEEE International Joint Conference on Neural Networks.
[10] Ashish Ghosh,et al. Evolutionary Algorithms for Data Mining and Knowledge Discovery , 2005 .
[11] Milos Manic,et al. Neural Network based Intrusion Detection System for critical infrastructures , 2009, 2009 International Joint Conference on Neural Networks.
[12] Chun-Hung Richard Lin,et al. Intrusion detection system: A comprehensive review , 2013, J. Netw. Comput. Appl..
[13] Ian H. Witten,et al. The WEKA data mining software: an update , 2009, SKDD.
[14] Itzhak Levin,et al. KDD-99 classifier learning contest LLSoft's results overview , 2000, SKDD.
[15] Guoyin Wang,et al. Erratum to “Experimental Analyses of the Major Parameters Affecting the Intensity of Outbursts of Coal and Gas” , 2014, The Scientific World Journal.
[16] Jian Ma,et al. A new approach to intrusion detection using Artificial Neural Networks and fuzzy clustering , 2010, Expert Syst. Appl..
[17] Feng Wang,et al. A Survey of Artificial Immune System Based Intrusion Detection , 2014, TheScientificWorldJournal.
[18] S. T. Sarasamma,et al. Hierarchical Kohonenen net for anomaly detection in network security , 2005, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).