메뉴 건너뛰기




Volumn , Issue , 2006, Pages

Model of network intrusion detection system based on BP algorithm

Author keywords

[No Author keywords available]

Indexed keywords

BACKPROPAGATION ALGORITHMS; MATHEMATICAL MODELS; NETWORK SECURITY; SYSTEMS ANALYSIS; TELECOMMUNICATION TRAFFIC;

EID: 42749105521     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICIEA.2006.257104     Document Type: Conference Paper
Times cited : (11)

References (6)
  • 1
    • 0037411435 scopus 로고    scopus 로고
    • The Neural Network Models for IDS based on the asymmetric costs of false negative errors and false positive errors
    • D. Joo, T. Hong and I. Han, "The Neural Network Models for IDS based on the asymmetric costs of false negative errors and false positive errors", Expert Systems with Applications, vol. 25, pp. 69-75, 2003.
    • (2003) Expert Systems with Applications , vol.25 , pp. 69-75
    • Joo, D.1    Hong, T.2    Han, I.3
  • 2
    • 0038330235 scopus 로고    scopus 로고
    • Fusion of Multiple Classifiers for Intrusion Detection in Computer Networks
    • G. Giacinto, F. Roli and L. Didaci, "Fusion of Multiple Classifiers for Intrusion Detection in Computer Networks", Pattern Recognition Letters, vol. 24, pp. 1795-1803, 2003
    • (2003) Pattern Recognition Letters , vol.24 , pp. 1795-1803
    • Giacinto, G.1    Roli, F.2    Didaci, L.3
  • 4
    • 0036613083 scopus 로고    scopus 로고
    • An Immunity-Based Technique to Characterize Intrusion in Computer Networks
    • D. Dasgupta and F. Gonzalez, "An Immunity-Based Technique to Characterize Intrusion in Computer Networks", IEEE Trans. On Evolutionary Computation, vol. 6, no.3, pp. 1081-1088, 2002
    • (2002) IEEE Trans. On Evolutionary Computation , vol.6 , Issue.3 , pp. 1081-1088
    • Dasgupta, D.1    Gonzalez, F.2
  • 5
    • 0037105910 scopus 로고    scopus 로고
    • Intrusion Detection Techniques and Approaches
    • T. Verwoerd and R. Hunt, "Intrusion Detection Techniques and Approaches", Computer Communi-cations, vol.25, no.15, pp. 1356-1365, 2002
    • (2002) Computer Communi-cations , vol.25 , Issue.15 , pp. 1356-1365
    • Verwoerd, T.1    Hunt, R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.