-
1
-
-
0021474230
-
Making computers think like people
-
August
-
L. A. Zadeh, "Making computers think like people," in IEEE Spectrum, p. 26, August 1984.
-
(1984)
IEEE Spectrum
, pp. 26
-
-
Zadeh, L.A.1
-
2
-
-
0023999614
-
-
L. A. Zadeh, "Fuzzy logic," vol. 21, no. 4, pp. 83-93, 1988.
-
(1988)
Fuzzy logic
, vol.21
, Issue.4
, pp. 83-93
-
-
Zadeh, L.A.1
-
3
-
-
71549167720
-
Security is fuzzy! applying the fuzzy logic paradigm to the multipolicy paradigm
-
Little Compton, Rhode Island, pp, August
-
H. A. Hosmer, "Security is fuzzy! applying the fuzzy logic paradigm to the multipolicy paradigm," in 1992-93 Workshop on New Secuity Paradigms, (Little Compton, Rhode Island), pp. 175-184, August 1993.
-
(1993)
1992-93 Workshop on New Secuity Paradigms
, pp. 175-184
-
-
Hosmer, H.A.1
-
5
-
-
23944493926
-
A framework for hybrid fuzzy logic intrusion detection systems
-
Reno, Nevada, pp
-
A. El-Semary, J. Edmonds, J. González-Pino, and M. Papa, "A framework for hybrid fuzzy logic intrusion detection systems," in 2005 IEEE International Conference on Fuzzy Systems, (Reno, Nevada), pp. 325-330, 2005.
-
(2005)
2005 IEEE International Conference on Fuzzy Systems
, pp. 325-330
-
-
El-Semary, A.1
Edmonds, J.2
González-Pino, J.3
Papa, M.4
-
6
-
-
33747370445
-
Implementation of a hybrid intrusion detection system using fuzzyjess
-
Miami, Florida, pp
-
A. El-Semary, J. Edmonds, J. González-Pino, and M. Papa, "Implementation of a hybrid intrusion detection system using fuzzyjess," in 7th International Conference on Enterprise Information Systems, (Miami, Florida), pp. 390-393, 2005.
-
(2005)
7th International Conference on Enterprise Information Systems
, pp. 390-393
-
-
El-Semary, A.1
Edmonds, J.2
González-Pino, J.3
Papa, M.4
-
7
-
-
85141038051
-
Mining audit data to build intrustion detection models
-
New York City, New York, pp, August
-
W. Lee, K. W. Mok, and S. J. Stolfo, "Mining audit data to build intrustion detection models," in Fourth International Conference on Knowledge Discovery and Data Mining, (New York City, New York), pp. 66-72, August 1998.
-
(1998)
Fourth International Conference on Knowledge Discovery and Data Mining
, pp. 66-72
-
-
Lee, W.1
Mok, K.W.2
Stolfo, S.J.3
-
8
-
-
0034247240
-
Mining fuzzy association rules and fuzzy frequency episodes for intrusion detection
-
John Wiley & Sons
-
J. Luo and S. Bridges, "Mining fuzzy association rules and fuzzy frequency episodes for intrusion detection," in International Journal of Intelligent Systems, pp. 687-703, John Wiley & Sons, 2000.
-
(2000)
International Journal of Intelligent Systems
, pp. 687-703
-
-
Luo, J.1
Bridges, S.2
-
9
-
-
0001882616
-
Fast algorithms for mining association rules
-
Santiago, Chile, pp, September
-
R. Agrawal and R. Srikant, "Fast algorithms for mining association rules," in 20th International Conference on Very Large Databases, (Santiago, Chile), pp. 487-499, September 1994.
-
(1994)
20th International Conference on Very Large Databases
, pp. 487-499
-
-
Agrawal, R.1
Srikant, R.2
-
12
-
-
0348132918
-
-
C. Kuok, A. Fu, and M. Wong, "Mining fuzzy association rules in databases," vol. 27, no. 1, pp. 41-46, 1998.
-
(1998)
Mining fuzzy association rules in databases
, vol.27
, Issue.1
, pp. 41-46
-
-
Kuok, C.1
Fu, A.2
Wong, M.3
-
13
-
-
84948699481
-
An improved algorithm for fuzzy data mining for intrusion detection
-
New Orleans, Louisiana, June
-
G. Florez, S. Bridges, and R. Vaughn, "An improved algorithm for fuzzy data mining for intrusion detection," in North American Fuzzy Information Processing Society Conference (NAFIPS 2002), (New Orleans, Louisiana), June 2002.
-
(2002)
North American Fuzzy Information Processing Society Conference (NAFIPS 2002)
-
-
Florez, G.1
Bridges, S.2
Vaughn, R.3
-
14
-
-
85006425144
-
Fuzzy sets and secure computer systems
-
Little Compton, Rhode Island, pp
-
S. Ovchinnikov, "Fuzzy sets and secure computer systems," in Workshop on New Security Paradigms, (Little Compton, Rhode Island), pp. 54-62, 1994.
-
(1994)
Workshop on New Security Paradigms
, pp. 54-62
-
-
Ovchinnikov, S.1
-
15
-
-
85012240666
-
Data mining-based intrusion detectors: An overview of the columbia ids project
-
S. J. Stolfo, W. Lee, P. K. Chan, W. Fan, and E. Eskin, "Data mining-based intrusion detectors: An overview of the columbia ids project," vol. 30, no. 4, pp. 5-14, 2001.
-
(2001)
, vol.30
, Issue.4
, pp. 5-14
-
-
Stolfo, S.J.1
Lee, W.2
Chan, P.K.3
Fan, W.4
Eskin, E.5
-
16
-
-
0033681199
-
Fuzzy network profiling for intrusion detection
-
Atlanta, Georgia, pp
-
J. E. Dickerson and J. A. Dickerson, "Fuzzy network profiling for intrusion detection," in NAFIPS 19th International Conference of the North American Fuzzy Information Processing Society, (Atlanta, Georgia), pp. 301-306, 2000.
-
(2000)
NAFIPS 19th International Conference of the North American Fuzzy Information Processing Society
, pp. 301-306
-
-
Dickerson, J.E.1
Dickerson, J.A.2
-
17
-
-
33747333910
-
Attribute selection using information gain for a fuzzy logic intrusion detection system
-
Orlando, Florida, pp, April
-
J. González-Pino, J. Edmonds, and M. Papa, "Attribute selection using information gain for a fuzzy logic intrusion detection system," in SPIE Symposium on Defense and Security - Data mining, intrusion detection, information assurance and data networks security 2006, (Orlando, Florida), pp. 121-130, April 2006.
-
(2006)
SPIE Symposium on Defense and Security - Data mining, intrusion detection, information assurance and data networks security 2006
, pp. 121-130
-
-
González-Pino, J.1
Edmonds, J.2
Papa, M.3
-
18
-
-
84973632308
-
Fuzzy reasoning in jess: The fuzzyj toolkit and fuzzyjess
-
Setubal, Portugal, pp
-
R. Orchard, "Fuzzy reasoning in jess: The fuzzyj toolkit and fuzzyjess," in ICEIS 2001, 3rd International Conference on Enterprise Information Systems, (Setubal, Portugal), pp. 533-542, 2001.
-
(2001)
ICEIS 2001, 3rd International Conference on Enterprise Information Systems
, pp. 533-542
-
-
Orchard, R.1
-
20
-
-
0038595377
-
1999 darpa intrusion detection system evaluation: Design and procedures
-
J. W. Haines, R. P. Lippmann, D. J. Fried, E. Tran, S. Boswell, and M. A. Zissman, "1999 darpa intrusion detection system evaluation: Design and procedures," in MIT Lincoln Laboratory Technical Report.
-
MIT Lincoln Laboratory Technical Report
-
-
Haines, J.W.1
Lippmann, R.P.2
Fried, D.J.3
Tran, E.4
Boswell, S.5
Zissman, M.A.6
-
21
-
-
33845961221
-
-
L. Laboratory, Lincoln laboratory data sets, in Massachusetts Institute of Technology, (http://www.ll.mit.edu/IST/ideval/ data/1999).
-
L. Laboratory, "Lincoln laboratory data sets," in Massachusetts Institute of Technology, (http://www.ll.mit.edu/IST/ideval/ data/1999).
-
-
-
|