메뉴 건너뛰기




Volumn , Issue , 2005, Pages 139-142

A multiple objective optimization based echo state network tree and application to intrusion detection

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTATIONAL COMPLEXITY; COMPUTER SIMULATION; DATABASE SYSTEMS; DERMATOLOGY; ESCHERICHIA COLI; FUZZY SETS; GENETIC ALGORITHMS; MATHEMATICAL MODELS; MATHEMATICAL OPERATORS; NEURAL NETWORKS; OPTIMIZATION; PATTERN RECOGNITION;

EID: 23844514163     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (17)

References (13)
  • 1
    • 0034300835 scopus 로고    scopus 로고
    • Improving intrusion detection performance using keyword selection and neural networks
    • Richard P. Lippmann, Robert K. Cunningham, "Improving intrusion detection performance using keyword selection and neural networks," Computer Networks 34, pp. 597-603, 2000.
    • (2000) Computer Networks , vol.34 , pp. 597-603
    • Lippmann, R.P.1    Cunningham, R.K.2
  • 2
    • 0035402096 scopus 로고    scopus 로고
    • Training a neural-network based intrusion detector to recognize novel attacks
    • July
    • Lee, S.C., Heinbuch, D.V., "Training a neural-network based intrusion detector to recognize novel attacks," IEEE Transactions on Systems, Man and Cybernetics, Part A, Volume: 31, Issue: 4, pp. 294-299, July 2001.
    • (2001) IEEE Transactions on Systems, Man and Cybernetics, Part A , vol.31 , Issue.4 , pp. 294-299
    • Lee, S.C.1    Heinbuch, D.V.2
  • 3
    • 0036588773 scopus 로고    scopus 로고
    • Incorporating soft computing techniques into a probabilistic intrusion detection system
    • May
    • Sung-Bae Cho, "Incorporating soft computing techniques into a probabilistic intrusion detection system," IEEE Transactions on Systems, Man and Cybernetics, Part C, Volume: 32, Issue: 2, pp. 154-160, May 2002.
    • (2002) IEEE Transactions on Systems, Man and Cybernetics, Part C , vol.32 , Issue.2 , pp. 154-160
    • Cho, S.-B.1
  • 4
    • 0037411435 scopus 로고    scopus 로고
    • The neural network models for IDS based on the asymmetric costs of false negative errors and false positive errors
    • July
    • Joo Daejoon, Hong Taeho, and Han Ingoo, "The neural network models for IDS based on the asymmetric costs of false negative errors and false positive errors," Expert Systems with Applications Volume: 25, Issue: 1, pp. 69-75, July 2003.
    • (2003) Expert Systems with Applications , vol.25 , Issue.1 , pp. 69-75
    • Daejoon, J.1    Taeho, H.2    Ingoo, H.3
  • 5
    • 0242637092 scopus 로고    scopus 로고
    • Detecting intrusion with rule-based integration of multiple models
    • October
    • Han Sang-Jun, Cho Sung-Bae, "Detecting intrusion with rule-based integration of multiple models,". Computers and Security Volume: 22, Issue: 7, pp. 613-623, October 2003.
    • (2003) Computers and Security , vol.22 , Issue.7 , pp. 613-623
    • Han, S.-J.1    Cho, S.-B.2
  • 6
    • 0037105910 scopus 로고    scopus 로고
    • Intrusion detection techniques and approaches
    • September 15
    • Verwoerd Theuns, Hunt Ray, "Intrusion detection techniques and approaches," computer Communications Volume: 25, Issue: 15, pp. 1356-1365, September 15, 2002.
    • (2002) Computer Communications , vol.25 , Issue.15 , pp. 1356-1365
    • Theuns, V.1    Ray, H.2
  • 7
    • 9444225565 scopus 로고    scopus 로고
    • Data driven multiple neural network models generator based on a tree-like scheduler
    • Madani K, Chebira A, and Rybnik M, "Data driven multiple neural network models generator based on a tree-like scheduler," LECT NOTES COMPUT SC 2686: pp. 382-389, 2003.
    • (2003) LECT NOTES COMPUT SC , vol.2686 , pp. 382-389
    • Madani, K.1    Chebira, A.2    Rybnik, M.3
  • 8
    • 0036832990 scopus 로고    scopus 로고
    • Hybrid decision tree
    • Zhihua Zhou, Zhaoqian Chen, "Hybrid decision tree," Knowledge-Based Systems 15, pp. 515-528, 2002.
    • (2002) Knowledge-based Systems , vol.15 , pp. 515-528
    • Zhou, Z.1    Chen, Z.2
  • 9
    • 0032162356 scopus 로고    scopus 로고
    • Decision trees can initialize radial basis function networks
    • Kubat M, "Decision trees can initialize radial basis function networks," IEEE Trans, Neural Networks, 9 (5): pp. 813-821, 1998.
    • (1998) IEEE Trans, Neural Networks , vol.9 , Issue.5 , pp. 813-821
    • Kubat, M.1
  • 10
    • 33645206685 scopus 로고    scopus 로고
    • Interpretable neural network tree for continuous-feature data sets
    • June
    • Qinzhen Xu, Qiangfu Zhao, Wenjiang Pei, Luxi Yang, and Zhenya He, "Interpretable Neural Network Tree For Continuous-Feature Data Sets," Neural Information Processing - Letters and Reviews Vol. 3, No. 3, pp. 77-84, June 2004.
    • (2004) Neural Information Processing - Letters and Reviews , vol.3 , Issue.3 , pp. 77-84
    • Xu, Q.1    Zhao, Q.2    Pei, W.3    Yang, L.4    He, Z.5
  • 13
    • 0032676506 scopus 로고    scopus 로고
    • A data mining framework for building intrusion detection models
    • Oakland, CA, May
    • Wenke Lee, "A data mining framework for building intrusion detection models," The 1999 IEEE Symposium on Security and Privacy, Oakland, CA, pp. 120-132, May 1999.
    • (1999) The 1999 IEEE Symposium on Security and Privacy , pp. 120-132
    • Lee, W.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.