-
1
-
-
0034300835
-
Improving intrusion detection performance using keyword selection and neural networks
-
Richard P. Lippmann, Robert K. Cunningham, "Improving intrusion detection performance using keyword selection and neural networks," Computer Networks 34, pp. 597-603, 2000.
-
(2000)
Computer Networks
, vol.34
, pp. 597-603
-
-
Lippmann, R.P.1
Cunningham, R.K.2
-
2
-
-
0035402096
-
Training a neural-network based intrusion detector to recognize novel attacks
-
July
-
Lee, S.C., Heinbuch, D.V., "Training a neural-network based intrusion detector to recognize novel attacks," IEEE Transactions on Systems, Man and Cybernetics, Part A, Volume: 31, Issue: 4, pp. 294-299, July 2001.
-
(2001)
IEEE Transactions on Systems, Man and Cybernetics, Part A
, vol.31
, Issue.4
, pp. 294-299
-
-
Lee, S.C.1
Heinbuch, D.V.2
-
3
-
-
0036588773
-
Incorporating soft computing techniques into a probabilistic intrusion detection system
-
May
-
Sung-Bae Cho, "Incorporating soft computing techniques into a probabilistic intrusion detection system," IEEE Transactions on Systems, Man and Cybernetics, Part C, Volume: 32, Issue: 2, pp. 154-160, May 2002.
-
(2002)
IEEE Transactions on Systems, Man and Cybernetics, Part C
, vol.32
, Issue.2
, pp. 154-160
-
-
Cho, S.-B.1
-
4
-
-
0037411435
-
The neural network models for IDS based on the asymmetric costs of false negative errors and false positive errors
-
July
-
Joo Daejoon, Hong Taeho, and Han Ingoo, "The neural network models for IDS based on the asymmetric costs of false negative errors and false positive errors," Expert Systems with Applications Volume: 25, Issue: 1, pp. 69-75, July 2003.
-
(2003)
Expert Systems with Applications
, vol.25
, Issue.1
, pp. 69-75
-
-
Daejoon, J.1
Taeho, H.2
Ingoo, H.3
-
5
-
-
0242637092
-
Detecting intrusion with rule-based integration of multiple models
-
October
-
Han Sang-Jun, Cho Sung-Bae, "Detecting intrusion with rule-based integration of multiple models,". Computers and Security Volume: 22, Issue: 7, pp. 613-623, October 2003.
-
(2003)
Computers and Security
, vol.22
, Issue.7
, pp. 613-623
-
-
Han, S.-J.1
Cho, S.-B.2
-
6
-
-
0037105910
-
Intrusion detection techniques and approaches
-
September 15
-
Verwoerd Theuns, Hunt Ray, "Intrusion detection techniques and approaches," computer Communications Volume: 25, Issue: 15, pp. 1356-1365, September 15, 2002.
-
(2002)
Computer Communications
, vol.25
, Issue.15
, pp. 1356-1365
-
-
Theuns, V.1
Ray, H.2
-
7
-
-
9444225565
-
Data driven multiple neural network models generator based on a tree-like scheduler
-
Madani K, Chebira A, and Rybnik M, "Data driven multiple neural network models generator based on a tree-like scheduler," LECT NOTES COMPUT SC 2686: pp. 382-389, 2003.
-
(2003)
LECT NOTES COMPUT SC
, vol.2686
, pp. 382-389
-
-
Madani, K.1
Chebira, A.2
Rybnik, M.3
-
9
-
-
0032162356
-
Decision trees can initialize radial basis function networks
-
Kubat M, "Decision trees can initialize radial basis function networks," IEEE Trans, Neural Networks, 9 (5): pp. 813-821, 1998.
-
(1998)
IEEE Trans, Neural Networks
, vol.9
, Issue.5
, pp. 813-821
-
-
Kubat, M.1
-
10
-
-
33645206685
-
Interpretable neural network tree for continuous-feature data sets
-
June
-
Qinzhen Xu, Qiangfu Zhao, Wenjiang Pei, Luxi Yang, and Zhenya He, "Interpretable Neural Network Tree For Continuous-Feature Data Sets," Neural Information Processing - Letters and Reviews Vol. 3, No. 3, pp. 77-84, June 2004.
-
(2004)
Neural Information Processing - Letters and Reviews
, vol.3
, Issue.3
, pp. 77-84
-
-
Xu, Q.1
Zhao, Q.2
Pei, W.3
Yang, L.4
He, Z.5
-
13
-
-
0032676506
-
A data mining framework for building intrusion detection models
-
Oakland, CA, May
-
Wenke Lee, "A data mining framework for building intrusion detection models," The 1999 IEEE Symposium on Security and Privacy, Oakland, CA, pp. 120-132, May 1999.
-
(1999)
The 1999 IEEE Symposium on Security and Privacy
, pp. 120-132
-
-
Lee, W.1
|