메뉴 건너뛰기




Volumn 2006, Issue , 2006, Pages 839-842

Intrusion detection system based on growing grid neural network

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTATIONAL METHODS; COMPUTER SOFTWARE; COMPUTER SYSTEM FIREWALLS; NEURAL NETWORKS; SELF ORGANIZING MAPS;

EID: 34047109040     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (3)

References (10)
  • 1
    • 15944375471 scopus 로고    scopus 로고
    • Intrusion detection using hierarchical neural net-works
    • May
    • C. Zhang, J. Jiang and M. Kamel, "Intrusion detection using hierarchical neural net-works", Pattern Recognition Letters, vol. 26, pp. 779-791, May 2005.
    • (2005) Pattern Recognition Letters , vol.26 , pp. 779-791
    • Zhang, C.1    Jiang, J.2    Kamel, M.3
  • 2
    • 33750126257 scopus 로고
    • Growing Grid - a self-organizing network with constant neighbourhood range and adaptation strength
    • B. Fritzke, "Growing Grid - a self-organizing network with constant neighbourhood range and adaptation strength", Neural Processing Letters, vol. 2, pp. 9-13, 1995.
    • (1995) Neural Processing Letters , vol.2 , pp. 9-13
    • Fritzke, B.1
  • 3
    • 0036789790 scopus 로고    scopus 로고
    • A self-organizing network that grows when required
    • S. Marsland, J. Shapiro and U. Nehmzow, "A self-organizing network that grows when required", Neural Networks, vol. 15, pp. 1041-1058, 2002.
    • (2002) Neural Networks , vol.15 , pp. 1041-1058
    • Marsland, S.1    Shapiro, J.2    Nehmzow, U.3
  • 4
    • 0034300835 scopus 로고    scopus 로고
    • Improving intrusion detection performance using keyworkd selection and neural networks
    • R. Lippmann and R. Cunningham, "Improving intrusion detection performance using keyworkd selection and neural networks", Computer Networks, vol 34, pp. 597-603, 2000.
    • (2000) Computer Networks , vol.34 , pp. 597-603
    • Lippmann, R.1    Cunningham, R.2
  • 5
    • 8344251737 scopus 로고    scopus 로고
    • Comparison of BPL and RBF Network in Intrusion Detection System
    • C. Zhang, J. Jiang and M. Kamel, "Comparison of BPL and RBF Network in Intrusion Detection System", LNAI 2639, pp. 466470, 2003.
    • (2003) LNAI , vol.2639 , pp. 466470
    • Zhang, C.1    Jiang, J.2    Kamel, M.3
  • 6
    • 9444277747 scopus 로고    scopus 로고
    • The application of artificial intelligence to misuse detection
    • September
    • J. Cannady and J. Mahaffey, "The application of artificial intelligence to misuse detection", Proceedings of the 1st RAID 1998, September 1998.
    • (1998) Proceedings of the 1st RAID
    • Cannady, J.1    Mahaffey, J.2
  • 7
    • 2442526701 scopus 로고    scopus 로고
    • Unsupervised learning techniques for an intrusion detection system
    • March
    • S. Zanero and S. Savaresi, "Unsupervised learning techniques for an intrusion detection system", Proceedings of the ACM SAC 2004, March 2004.
    • (2004) Proceedings of the ACM SAC 2004
    • Zanero, S.1    Savaresi, S.2
  • 9
    • 35248842651 scopus 로고    scopus 로고
    • Detecting anomalous network traffic with self-organizing maps
    • Proceedings of the RAID, September
    • M. Ramadas, S. Ostermann and B. Tjaden, "Detecting anomalous network traffic with self-organizing maps", Proceedings of the RAID 2003, LNCS 2820, pp. 36-54, September 2003.
    • (2003) LNCS , vol.2820 , pp. 36-54
    • Ramadas, M.1    Ostermann, S.2    Tjaden, B.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.