-
1
-
-
33751114535
-
Detecting grid-abuse attacks by source-based monitoring
-
International Society Computers & Their Applications, September
-
J. Wu, D. Cheng, W. Zhao, "Detecting Grid-abuse Attacks by Source-based Monitoring", 17th International Conference on Parallel and Distributed Computing Systems, International Society Computers & Their Applications, September 2004.
-
(2004)
17th International Conference on Parallel and Distributed Computing Systems
-
-
Wu, J.1
Cheng, D.2
Zhao, W.3
-
2
-
-
33751096321
-
D-scids: Distributed soft computing intrusion detection system
-
Elsevier, Available online 30 August
-
A. Abraham, R. Jain, J. Thomas, S. Y. Han, "D-Scids: Distributed Soft Computing Intrusion Detection System", Journal of Network and Computer Applications, Elsevier, Available online 30 August 2005.
-
(2005)
Journal of Network and Computer Applications
-
-
Abraham, A.1
Jain, R.2
Thomas, J.3
Han, S.Y.4
-
3
-
-
22144466944
-
Modeling human behavior in user-adaptive systems: Recent advances using soft computing techniques
-
E. Frias-Martinez, G. Magoulas, S. Chen, and Macredie R., "Modeling Human Behavior in User-adaptive Systems: Recent Advances Using Soft Computing Techniques", Expert System with Applications, Vol. 29(2), 2005.
-
(2005)
Expert System with Applications
, vol.29
, Issue.2
-
-
Frias-Martinez, E.1
Magoulas, G.2
Chen, S.3
Macredie, R.4
-
4
-
-
33745590283
-
A multi-agent based system for intrusion detection
-
Nov.
-
I.M. Hegazy, T. Al-Arif, Z.T Fayed, H.M. Faheem, "A Multi-agent Based System for Intrusion Detection", IEEE Potentials, Volume 22(4), Nov., 2003.
-
(2003)
IEEE Potentials
, vol.22
, Issue.4
-
-
Hegazy, I.M.1
Al-Arif, T.2
Fayed, Z.T.3
Faheem, H.M.4
-
5
-
-
3042605003
-
A cooperative agent-based model for active security system
-
Academic Press, Nov.
-
Zaki M., S. Tarek, "A Cooperative Agent-based Model for Active Security System", Academic Press, Journal of Network and Computer Applications, Vol. 27(4), Nov., 2004.
-
(2004)
Journal of Network and Computer Applications
, vol.27
, Issue.4
-
-
Zaki, M.1
Tarek, S.2
-
6
-
-
84946111613
-
Agent-based distributed intrusion source identification
-
W. Hongjun, W. Ruijun, W. Cuirong, G. Yuan, "Agent-Based Distributed Intrusion Source Identification", IEEE Proceedings of the 2003 International Conference on Computer Networks and Mobile Computing (ICCNMC'03), 2003.
-
(2003)
IEEE Proceedings of the 2003 International Conference on Computer Networks and Mobile Computing (ICCNMC'03)
-
-
Hongjun, W.1
Ruijun, W.2
Cuirong, W.3
Yuan, G.4
-
8
-
-
0028534525
-
Soft computing and fuzzy logic
-
November
-
Lotfi A. Zadeh, "Soft Computing and Fuzzy Logic", IEEE Software, Volume 11 (6), November 1994.
-
(1994)
IEEE Software
, vol.11
, Issue.6
-
-
Zadeh, L.A.1
-
11
-
-
0036588773
-
Incorporating soft computing techniques into a probabilistic intrusion detection system
-
May
-
Sung-Bae Cho, "Incorporating Soft Computing Techniques Into A Probabilistic Intrusion Detection System", IEEE Transactions on Systems, Man, and Cybernetics, Part C vol. 32(2), May 2002.
-
(2002)
IEEE Transactions on Systems, Man, and Cybernetics, Part C
, vol.32
, Issue.2
-
-
Cho, S.-B.1
-
13
-
-
0036079805
-
Host-based intrusion detection using self-organizing maps
-
Hawaii, USA, May
-
P. Lichodzijewski, A. N. Zincir-Heywood, M. I. Heywood, "Host-Based Intrusion Detection Using Self-Organizing Maps", Proceedings of the IEEE 2002 International Joint Conference on Neural Networks, Hawaii, USA, May 2002.
-
(2002)
Proceedings of the IEEE 2002 International Joint Conference on Neural Networks
-
-
Lichodzijewski, P.1
Zincir-Heywood, A.N.2
Heywood, M.I.3
-
14
-
-
0002017886
-
-
E. Oja & S. Kaski, editors, Kohonen maps, Elsevier, Amsterdam
-
T. Kohonen, S. Kaski, K. Lagus, J. Salojrvi, J. Honkela, V. Paatero & A. Saarela, "Self Organization of a Massive Text Document Collection", In E. Oja & S. Kaski, editors, Kohonen maps, Elsevier, Amsterdam, 1999.
-
(1999)
Self Organization of a Massive Text Document Collection
-
-
Kohonen, T.1
Kaski, S.2
Lagus, K.3
Salojrvi, J.4
Honkela, J.5
Paatero, V.6
Saarela, A.7
-
15
-
-
25844530263
-
GA-TSKFNN: Parameters tuning of fuzzy neural network using genetic algorithms
-
November
-
A.M. Tang, C. Quek, and G.S. Ng, "GA-TSKFNN: Parameters Tuning of Fuzzy Neural Network Using genetic Algorithms", Expert Systems with Applications, Vol. 29(4), November 2005.
-
(2005)
Expert Systems with Applications
, vol.29
, Issue.4
-
-
Tang, A.M.1
Quek, C.2
Ng, G.S.3
-
16
-
-
0037276988
-
Tuning of the structure and parameters of a neural network using an improved genetic algorithm
-
Jan.
-
F. Leung, H. Lam, S. Ling, and P. Tam, "Tuning of the Structure and Parameters of a Neural Network Using an Improved Genetic Algorithm," IEEE Trans. Neural Network, Vol.14(1), Jan. 2003.
-
(2003)
IEEE Trans. Neural Network
, vol.14
, Issue.1
-
-
Leung, F.1
Lam, H.2
Ling, S.3
Tam, P.4
-
17
-
-
15244355266
-
Applying a hybrid approach based on fuzzy neural network and genetic algorithm to product form design
-
May
-
H. Shih-Wen, T. Hung-Cheng, "Applying a Hybrid Approach Based on Fuzzy Neural Network and Genetic Algorithm to Product Form Design", International Journal of Industrial Ergonomics, Volume 35(5), May 2005.
-
(2005)
International Journal of Industrial Ergonomics
, vol.35
, Issue.5
-
-
Shih-Wen, H.1
Hung-Cheng, T.2
|