-
2
-
-
0038103911
-
Utilizing fuzzy logic and trend analysis for effective intrusion detection
-
July
-
Botha Martin and von Solms Rossouw. "Utilizing fuzzy logic and trend analysis for effective intrusion detection," Computers and Security, vol.22, Issue 5, pp. 423-434, July, 2003.
-
(2003)
Computers and Security
, vol.22
, Issue.5
, pp. 423-434
-
-
Martin, B.1
Von Solms, R.2
-
3
-
-
0036928063
-
Artificial immune theory based network intrusion detection system and the algorithms design
-
Yang Xiang-Rong, Shen Jun-Yi, Wang Rui, "Artificial immune theory based network intrusion detection system and the algorithms design," Proceedings of 2002 International Conference on Machine Learning and Cybernetics, vol. 1, pp.73-77, 2002.
-
(2002)
Proceedings of 2002 International Conference on Machine Learning and Cybernetics
, vol.1
, pp. 73-77
-
-
Yang, X.-R.1
Shen, J.-Y.2
Wang, R.3
-
4
-
-
0037411435
-
The neural network models for IDS based on the asymmetric costs of false negative errors and false positive errors
-
July
-
Joo Daejoon, Hong Taeho, and Han Ingoo. "The neural network models for IDS based on the asymmetric costs of false negative errors and false positive errors," Expert Systems with Applications, vol. 25, Issue 1, pp. 69-75, July, 2003.
-
(2003)
Expert Systems with Applications
, vol.25
, Issue.1
, pp. 69-75
-
-
Joo, D.1
Hong, T.2
Han, I.3
-
5
-
-
0036085392
-
Intrusion detection using neural networks and support vector machines
-
Mukkamala Srinivas, Janoski Guadalupe, and Sung Andrew, "Intrusion detection using neural networks and support vector machines," Proceedings of the International Joint Conference on Neural Networks, vol.2, pp. 1702-1707, 2002.
-
(2002)
Proceedings of the International Joint Conference on Neural Networks
, vol.2
, pp. 1702-1707
-
-
Srinivas, M.1
Guadalupe, J.2
Andrew, S.3
-
6
-
-
0036355120
-
Application of a distributed data mining approach to network intrusion detection
-
Bala Jerzy, Baik Sung, Hadjarian Ali et al. "Application of a distributed data mining approach to network intrusion detection," Proceedings of the International Conference on Autonomous Agents, no.3, pp. 1419-1420, 2002.
-
(2002)
Proceedings of the International Conference on Autonomous Agents
, Issue.3
, pp. 1419-1420
-
-
Jerzy, B.1
Sung, B.2
Ali, H.3
-
7
-
-
0242637516
-
Adaptive intrusion detection with data mining
-
Hossain Mahmood, Bridges Susan M., Vaughn Jr. Rayford B., "Adaptive intrusion detection with data mining, Proc. of the IEEE Int Conf on Systems, Man and Cybernetics," vol. 4, pp.3097-3103, 2003.
-
(2003)
Proc. of the IEEE Int Conf on Systems, Man and Cybernetics
, vol.4
, pp. 3097-3103
-
-
Mahmood, H.1
Bridges Susan, M.2
Vaughn Jr., R.B.3
-
14
-
-
0035243053
-
D-S evidence reasoning and its data fusion application in target recognition
-
in Chinese
-
Lan Jinhui, Ma Baohua, Lan Tian, et al., "D-S evidence reasoning and its data fusion application in target recognition," Journal of Tsinghua University (Natural Sci. Ed.). vol.41 No.02 pp.53-55, 2001. (in Chinese)
-
(2001)
Journal of Tsinghua University (Natural Sci. Ed.)
, vol.41
, Issue.2
, pp. 53-55
-
-
Lan, J.1
Ma, B.2
Lan, T.3
-
15
-
-
0034941970
-
Attack classification research and a distributed network intrusion detect system
-
in Chinese
-
WANG Xiao-cheng, LIU En-de, and Xie Xiao-quan, "Attack Classification Research And A Distributed Network Intrusion Detect System, " Journal Of Computer Research & Development, vol.38, no.6 pp.727-734, 2001.(in Chinese)
-
(2001)
Journal of Computer Research & Development
, vol.38
, Issue.6
, pp. 727-734
-
-
Wang, X.-C.1
Liu, E.-D.2
Xie, X.-Q.3
|