-
1
-
-
0037411435
-
The neural network models for IDS based on the asymmetric costs of false negative errors and false positive errors
-
D. Joo, T. Hong and I. Han, "The Neural Network Models for IDS based on the asymmetric costs of false negative errors and false positive errors", Expert Systems with Applications, Vol. 25, pp. 69-75, 2003
-
(2003)
Expert Systems with Applications
, vol.25
, pp. 69-75
-
-
Joo, D.1
Hong, T.2
Han, I.3
-
2
-
-
0036085392
-
Intrusion detection using neural networks and support vector machines
-
S. Mukkamala, G. Janoski and A. Sung, "Intrusion Detection Using Neural Networks and Support Vector Machines", Proc. of the 2002 International Joint Conference on Neural Networks, Vol. 2, pp. 1702-1707, 2002
-
(2002)
Proc. of the 2002 International Joint Conference on Neural Networks
, vol.2
, pp. 1702-1707
-
-
Mukkamala, S.1
Janoski, G.2
Sung, A.3
-
3
-
-
0034300835
-
Improving intrusion detection performance using keyword selection and neural networks
-
R. P. Lippmann and R. K. Cunningham, "Improving Intrusion Detection Performance using Keyword Selection and Neural Networks", Computer Networks, Vol. 34, No. 4, pp. 597-603, 2000
-
(2000)
Computer Networks
, vol.34
, Issue.4
, pp. 597-603
-
-
Lippmann, R.P.1
Cunningham, R.K.2
-
4
-
-
6344255762
-
Next generation intrusion detection: Autonomous reinforcement learning of network attacks
-
Baltimore, 16-19 October
-
J. Cannady, "Next Generation Intrusion Detection: Autonomous Reinforcement Learning of Network Attacks", Proc. 23rd National Information Systems Security Conference, pp. 1-12, Baltimore, 16-19 October 2000
-
(2000)
Proc. 23rd National Information Systems Security Conference
, pp. 1-12
-
-
Cannady, J.1
-
5
-
-
84898944587
-
Intrusion detection with neural networks
-
Cambridge, MA: MIT Press
-
J. Ryan, M. J. Lin and R. Miikkulainen, "Intrusion Detection with Neural Networks", Advances in Neural Information Processing Systems, Vol. 10, pp. 943-949, Cambridge, MA: MIT Press, 1998
-
(1998)
Advances in Neural Information Processing Systems
, vol.10
, pp. 943-949
-
-
Ryan, J.1
Lin, M.J.2
Miikkulainen, R.3
-
6
-
-
0038330235
-
Fusion of multiple classifiers for intrusion detection in computer networks
-
G. Giacinto, F. Roli and L. Didaci, "Fusion of Multiple Classifiers for Intrusion Detection in Computer Networks", Pattern Recognition Letters, Vol. 24, pp. 1795-1803, 2003
-
(2003)
Pattern Recognition Letters
, vol.24
, pp. 1795-1803
-
-
Giacinto, G.1
Roli, F.2
Didaci, L.3
-
7
-
-
0037105910
-
Intrusion detection techniques an dapproaches
-
T. Verwoerd an dR. Hunt, "Intrusion Detection Techniques an dApproaches", Computer Communications, Vol. 25, No. 15, pp. 1356-1365, 2002
-
(2002)
Computer Communications
, vol.25
, Issue.15
, pp. 1356-1365
-
-
Verwoerd, T.1
Hunt, D.2
-
8
-
-
0036613083
-
An immunity-based technique to characterize intrusion in computer networks
-
D. Dasgupta and F. Gonzalez, "An Immunity-Based Technique to Characterize Intrusion in Computer Networks", IEEE Trans. On Evolutionary Computation, Vol. 6, No 3, pp. 1081-1088, 2002
-
(2002)
IEEE Trans. on Evolutionary Computation
, vol.6
, Issue.3
, pp. 1081-1088
-
-
Dasgupta, D.1
Gonzalez, F.2
|