-
1
-
-
0023294428
-
An Intrusion Detection Model
-
IEEE Computer Society,CA
-
Denning, D.E., "An Intrusion Detection Model", IEEE Transactions on Software Engineering, vol.13, IEEE Computer Society,CA,1987,pp.222-232.
-
(1987)
IEEE Transactions on Software Engineering
, vol.13
, pp. 222-232
-
-
Denning, D.E.1
-
2
-
-
0031644250
-
-
Bonifacio, J. M., Cansian, A. M. , de Carvalho, A. C. P. L. F. , et al. Neural Network Applied in Intrusion Detection Systems, Proceedings of the 1998 IEEE International Joint Conference on Neural Networks,IEEE Piscataway,New Jersey: 1998, pp.205-210.
-
Bonifacio, J. M., Cansian, A. M. , de Carvalho, A. C. P. L. F. , et al. "Neural Network Applied in Intrusion Detection Systems", Proceedings of the 1998 IEEE International Joint Conference on Neural Networks,IEEE Piscataway,New Jersey: 1998, pp.205-210.
-
-
-
-
3
-
-
6344260530
-
The research and implementation of intelligent intrusion detection system based on artificial neural network
-
Shanghai
-
Jian Li, Zhang Guoyi,Gu Guochang, "The research and implementation of intelligent intrusion detection system based on artificial neural network", The 3rd International Conference on Machine Learning and Cybernetics, Shanghai, 2004.
-
(2004)
The 3rd International Conference on Machine Learning and Cybernetics
-
-
Jian, L.1
-
4
-
-
0242576344
-
Rule extraction from nerual networks for intrusion detection in computer networks.Systems
-
IEEE Inc,CA
-
A Hofmann,C Schmitz,B Sick, "Rule extraction from nerual networks for intrusion detection in computer networks.Systems", IEEE Transactions on system,Man and Cybernetics, IEEE Inc,CA,2003, pp.1259-1265.
-
(2003)
IEEE Transactions on system,Man and Cybernetics
, pp. 1259-1265
-
-
Hofmann, A.1
Schmitz, C.2
Sick, B.3
-
5
-
-
43549085766
-
Intrusion Recognition Using Neural Networks
-
Sofia, Bulgaria,5-7 September
-
Vladimir Golovko, Pavel Kochurko. "Intrusion Recognition Using Neural Networks". IEEE Workshop on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, Sofia, Bulgaria,5-7 September, 2005,pp.108-111.
-
(2005)
IEEE Workshop on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications
, pp. 108-111
-
-
Golovko, V.1
Kochurko, P.2
-
6
-
-
0032188308
-
Rough Set Theory and Its Applications to Data Analysis
-
Taylor&Francis,KY
-
Pawlak Z, "Rough Set Theory and Its Applications to Data Analysis", Cybernetics and Systems, Taylor&Francis,KY,1998,pp. 661-688.
-
(1998)
Cybernetics and Systems
, pp. 661-688
-
-
Pawlak, Z.1
-
7
-
-
0035414683
-
Ramanna S. Rough neural computing in signal analysis
-
CA
-
Peters J F, Han L, "Ramanna S. Rough neural computing in signal analysis", Computational Intelligence, IEEE Inc,CA,2001,17(3), pp.493-513.
-
(2001)
Computational Intelligence, IEEE Inc
, vol.17
, Issue.3
, pp. 493-513
-
-
Peters, J.F.1
Han, L.2
-
8
-
-
15744395323
-
Rough neural network and its application to in telligent information procession
-
ShenYang,China
-
Zhang Dong bo, WANG Yao nan, YI Ling zhi, "Rough neural network and its application to in telligent information procession", Control and Decision,ShenYang,China,2005,20(2),pp.121-126.
-
(2005)
Control and Decision
, vol.20
, Issue.2
, pp. 121-126
-
-
Dong bo, Z.1
Yao nan, W.A.N.G.2
Ling zhi, Y.I.3
-
9
-
-
38049028638
-
-
1999 KDD Cup Competition. http://kdd.ics.uci.edu/databases/kddcup99
-
1999 KDD Cup Competition. http://kdd.ics.uci.edu/databases/kddcup99
-
-
-
-
10
-
-
38049051165
-
The Technology of Attack Feature Selection Based on Conditional Information Entropy, Mini-Micro Systems, ShenYang,China
-
Accepted
-
Chen Bo, Yu Ling, and Ji Gen-lin, "The Technology of Attack Feature Selection Based on Conditional Information Entropy", Mini-Micro Systems, ShenYang,China,2006,Accepted.
-
(2006)
-
-
Chen, B.1
Ling, Y.2
Gen-lin, J.3
-
12
-
-
0034878556
-
Predicting time series using wavelet packet neural networks
-
IEEE, Washington
-
Lipo Wang,Kok Keong Teo,and Zhiping Lin "Predicting time series using wavelet packet neural networks", Proceedings of the IJCNN, IEEE, Washington,2001,pp. 1593-1597.
-
(2001)
Proceedings of the IJCNN
, pp. 1593-1597
-
-
Wang, L.1
Keong Teo, K.2
Lin, Z.3
-
13
-
-
84957868979
-
Wavelet packet multi-layer perceptron for chaotic time series prediction: Effects of weight initialization
-
Proceedings of International Confence Computational Science ICCS Part II, Springer, Berlin
-
Teo, K.K., L.P. Wang, Lin, Z., "Wavelet packet multi-layer perceptron for chaotic time series prediction: effects of weight initialization", Proceedings of International Confence Computational Science ICCS Part II, LNCS Vol. 2074, Springer, Berlin,2001,pp.310-317.
-
(2001)
LNCS
, vol.2074
, pp. 310-317
-
-
Teo, K.K.1
Wang, L.P.2
Lin, Z.3
-
14
-
-
0027147212
-
Wave-net: A multiresolution, hierarchical neural network with localized learning
-
AIChE,USA
-
Bakshi, B. R. and Stephanopoulos, G, "Wave-net: A multiresolution, hierarchical neural network with localized learning", AIChE Journal, AIChE,USA, 1993,39(1), pp.57-80.
-
(1993)
AIChE Journal
, vol.39
, Issue.1
, pp. 57-80
-
-
Bakshi, B.R.1
Stephanopoulos, G.2
-
15
-
-
0036506154
-
Focused local learning with wavelet neural networks
-
IEEE Inc,CA
-
Rying E A , Bilbro G L , and Lu JyeChyi, "Focused local learning with wavelet neural networks", IEEE Trans Neural Networks, IEEE Inc,CA,2002, 13(2),pp.304-320.
-
(2002)
IEEE Trans Neural Networks
, vol.13
, Issue.2
, pp. 304-320
-
-
Rying, E.A.1
Bilbro, G.L.2
JyeChyi, L.3
-
16
-
-
0032535817
-
Multidimensional non-orthogonal wavelet-sigmoid basis function neural network for dynamic process fault diagnosis
-
Purdue University
-
Jinsong Zhao, Bingzhen Chen, and Jingzhu Shen, "Multidimensional non-orthogonal wavelet-sigmoid basis function neural network for dynamic process fault diagnosis", Computers and Chemical Engineering, vol.23, Purdue University,1998,pp.83-92.
-
(1998)
Computers and Chemical Engineering
, vol.23
, pp. 83-92
-
-
Zhao, J.1
Chen, B.2
Shen, J.3
-
17
-
-
84928016636
-
The base-rate fallacy and the difficulty of intrusion detection 1
-
Association for Computing Machinery,USA
-
Stefan Axelsson, "The base-rate fallacy and the difficulty of intrusion detection 1", ACM Transactions on Information and System Security, Association for Computing Machinery,USA,2000,3(3),pp. 186-205.
-
(2000)
ACM Transactions on Information and System Security
, vol.3
, Issue.3
, pp. 186-205
-
-
Axelsson, S.1
|