메뉴 건너뛰기




Volumn 5812, Issue , 2005, Pages 23-30

A study on fuzzy intrusion detection

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER NETWORKS; DISTRIBUTED COMPUTER SYSTEMS; SECURITY OF DATA;

EID: 27544469503     PISSN: 0277786X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1117/12.604465     Document Type: Conference Paper
Times cited : (47)

References (22)
  • 2
    • 0003914522 scopus 로고    scopus 로고
    • State of the practice of intrusion detection technologies
    • CMU/SEI-99-TR-028
    • J. Allen, A. Christie, and W. Fithen, State of the Practice of Intrusion Detection Technologies, Technical Report, CMU/SEI-99-TR-028, 2000.
    • (2000) Technical Report
    • Allen, J.1    Christie, A.2    Fithen, W.3
  • 3
    • 0003907293 scopus 로고    scopus 로고
    • Macmillan Technical Publishing, Indianapolis, USA
    • R.G. Bace, Intrusion Detection, Macmillan Technical Publishing, Indianapolis, USA, 2000.
    • (2000) Intrusion Detection
    • Bace, R.G.1
  • 5
    • 27144489164 scopus 로고    scopus 로고
    • A tutorial on support vector machines for pattern recognition
    • C. Burge, A Tutorial on Support Vector Machines for Pattern Recognition, Data mining and knowledge discovery journal, 2(2), 121-167, 1998.
    • (1998) Data Mining and Knowledge Discovery Journal , vol.2 , Issue.2 , pp. 121-167
    • Burge, C.1
  • 6
    • 0346076782 scopus 로고    scopus 로고
    • Support vector learning for fuzzy rule-based classification systems
    • Y. Chen and J.Z. Wang, Support Vector Learning for Fuzzy Rule-Based Classification Systems, IEEE Transactions on Fuzzy Systems, 11(6), 716-728, 2003.
    • (2003) IEEE Transactions on Fuzzy Systems , vol.11 , Issue.6 , pp. 716-728
    • Chen, Y.1    Wang, J.Z.2
  • 7
    • 0242302742 scopus 로고    scopus 로고
    • Intrusion detection
    • B.V. Dasarathy, Intrusion detection, Information Fusion, 4(4), 243-245, 2003.
    • (2003) Information Fusion , vol.4 , Issue.4 , pp. 243-245
    • Dasarathy, B.V.1
  • 8
    • 0344835883 scopus 로고    scopus 로고
    • Characterising complexity by the degrees of freedom in a radial basis function network
    • D. Lowe, Characterising complexity by the degrees of freedom in a radial basis function network, Neurocomputing, 19(1-3), 199-209, 1998.
    • (1998) Neurocomputing , vol.19 , Issue.1-3 , pp. 199-209
    • Lowe, D.1
  • 10
    • 27544512530 scopus 로고    scopus 로고
    • Data mining for intrusion detection, a critical review
    • D. Barbara and S. Jajodia (Eds.), Kluwer Academic Publisher
    • K. Julish, Data Mining for Intrusion Detection, a Critical Review, in Applications of Data Mining in Computer Security, D. Barbara and S. Jajodia (Eds.), Kluwer Academic Publisher, 2002.
    • (2002) Applications of Data Mining in Computer Security
    • Julish, K.1
  • 12
    • 0002714543 scopus 로고    scopus 로고
    • Making large-scale SVM learning practical
    • B. Schölkopf, C. Burges and A. Smola (Eds.), MIT-Press
    • T. Joachims, Making large-Scale SVM Learning Practical, in Advances in Kernel Methods - Support Vector Learning, B. Schölkopf, C. Burges and A. Smola (Eds.), MIT-Press, 1999.
    • (1999) Advances in Kernel Methods - Support Vector Learning
    • Joachims, T.1
  • 13
    • 84872281780 scopus 로고    scopus 로고
    • KDD Cup 1999: http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html
    • KDD Cup 1999
  • 14
    • 85084163349 scopus 로고    scopus 로고
    • Data mining approaches for intrusion detection
    • W. Lee and S.J. Stolfo, Data Mining Approaches for Intrusion Detection, 7th USENIX Security Symposium, 1998, pp. 79-94.
    • (1998) 7th USENIX Security Symposium , pp. 79-94
    • Lee, W.1    Stolfo, S.J.2
  • 15
    • 0034247240 scopus 로고    scopus 로고
    • Mining fuzzy association rules and fuzzy frequency episodes for intrusion detection
    • J. Luo and S.M. Bridges, Mining Fuzzy Association Rules and Fuzzy Frequency Episodes for Intrusion Detection, International Journal of Intelligent Systems, 15(8), 687-704, 2000.
    • (2000) International Journal of Intelligent Systems , vol.15 , Issue.8 , pp. 687-704
    • Luo, J.1    Bridges, S.M.2
  • 18
    • 0037142572 scopus 로고    scopus 로고
    • Anomaly intrusion detection method based on HMM
    • Y. Qiao, X.W. Xin, Y. Bin and S. Ge, Anomaly Intrusion Detection Method Based on HMM, Electronics Letters, 38(13), 663-664, 2002.
    • (2002) Electronics Letters , vol.38 , Issue.13 , pp. 663-664
    • Qiao, Y.1    Xin, X.W.2    Bin, Y.3    Ge, S.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.