메뉴 건너뛰기




Volumn 2, Issue , 2006, Pages 128-134

Combination artificial ant clustering and K-PSO clustering approach to network security model

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTATIONAL COMPLEXITY; COMPUTER SYSTEMS; DATA MINING; ELECTRONIC COMMERCE; ETHERNET; MATHEMATICAL MODELS; NETWORK SECURITY; OPTIMIZATION; TELECOMMUNICATION CABLES;

EID: 34247203682     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICHIT.2006.253601     Document Type: Conference Paper
Times cited : (6)

References (19)
  • 3
    • 0009956176 scopus 로고    scopus 로고
    • Machine Learning techniques for the Computer Security
    • PhD thesis, Purdue University
    • T. Lane, "Machine Learning techniques for the Computer Security", PhD thesis, Purdue University, 2000.
    • (2000)
    • Lane, T.1
  • 5
    • 0036613083 scopus 로고    scopus 로고
    • An Immunity-based Technique to Characterize Intrusions in Computer Networks
    • June
    • D. Dagupta and F. Gonzalez, "An Immunity-based Technique to Characterize Intrusions in Computer Networks", IEEE Transactions on Evolutionary Computation, Vol. 6, June 2002, pp.28- 291.
    • (2002) IEEE Transactions on Evolutionary Computation , vol.6 , pp. 28-291
    • Dagupta, D.1    Gonzalez, F.2
  • 8
    • 33645961388 scopus 로고    scopus 로고
    • An Artificial Immune System for Fuzzy-rule Induction in Data Mining
    • Berlin: Springer-Verlag, v
    • R.T. Alves, M.R.B.S. Delgado, H.S. Lopes, A.A. Freitas, "An Artificial Immune System for Fuzzy-rule Induction in Data Mining", Lecture Notes in Computer Science, Berlin: Springer-Verlag, v. 3242, 2004, pp. 1011-1020.
    • (2004) Lecture Notes in Computer Science , vol.3242 , pp. 1011-1020
    • Alves, R.T.1    Delgado, M.R.B.S.2    Lopes, H.S.3    Freitas, A.A.4
  • 13
    • 21644438600 scopus 로고    scopus 로고
    • Alternative KPSO-Clustering Algorithm
    • Fun Ye and Ching-Yi Chen, "Alternative KPSO-Clustering Algorithm, "Tamkang Journal of Science and Engineering, Vol. 8, No. 2, pp. 165-174, 2005.
    • (2005) Tamkang Journal of Science and Engineering , vol.8 , Issue.2 , pp. 165-174
    • Fun, Y.1    Chen, C.2
  • 15
    • 34247210082 scopus 로고    scopus 로고
    • KDD data set, 1999; http://kdd.ics.uci.edu/databases/kddcup99/kddcup99. html
    • (1999)
    • data set, K.D.D.1
  • 16
    • 84874124494 scopus 로고    scopus 로고
    • Visualization of anomaly detection using prediction sensitivity
    • April
    • P. Laskov, K. Rieck, C. Schäfer, K.R. Müller, "Visualization of anomaly detection using prediction sensitivity", Proc.of Sicherheit, April 2005, 197-208.
    • (2005) Proc.of Sicherheit , pp. 197-208
    • Laskov, P.1    Rieck, K.2    Schäfer, C.3    Müller, K.R.4
  • 18
    • 34247187961 scopus 로고    scopus 로고
    • Proc. Int. Conf. on ICT-Mercu Buana ICT2005
    • W. Chimphlee, Abdul Hanan Abdullah, Mohd Noor Md Sap and S. Chimphlee, "Unsupervised Anomaly Detection with Unlabeled Data Using Clustering", Proc. Int. Conf. on ICT-Mercu Buana ICT2005. 42-49.
    • Chimphlee, W.1    Hanan Abdullah, A.2    Noor, M.3    Sap, M.4    Chimphlee, S.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.