-
1
-
-
0000231655
-
Artificial neural networks for misuse detection
-
anonymous ed, Arlington, VA, October 5-8, pp
-
Cannady, J.: Artificial neural networks for misuse detection. In: anonymous (ed.) Proceedings of the 1998 National Information Systems Security Conference (NISSC 1998), Arlington, VA, October 5-8, pp. 443-456 (1998)
-
(1998)
Proceedings of the 1998 National Information Systems Security Conference (NISSC
, pp. 443-456
-
-
Cannady, J.1
-
2
-
-
51949095115
-
Multiagent decision support systems based on supervised learning
-
Czibula, G., Guran, A., Cojocar, G., Czibula, I.: Multiagent decision support systems based on supervised learning. In: IEEE International Conference on Automation, Quality and Testing, Robotics, 2008. AQTR 2008, vol. 3, pp. 353-358 (2008)
-
(2008)
IEEE International Conference on Automation, Quality and Testing, Robotics, 2008. AQTR
, vol.3
, pp. 353-358
-
-
Czibula, G.1
Guran, A.2
Cojocar, G.3
Czibula, I.4
-
3
-
-
33845948249
-
Attack characterization and intrusion detection using an ensemble of self-organizing maps
-
DeLooze, L.L.: Attack characterization and intrusion detection using an ensemble of self-organizing maps. In: 7th Annual IEEE Information Assurance Workshop, pp. 108-115 (2006)
-
(2006)
7th Annual IEEE Information Assurance Workshop
, pp. 108-115
-
-
DeLooze, L.L.1
-
4
-
-
0020068152
-
Self-organized formation of topologically correct feature maps
-
Kohonen, T.: Self-organized formation of topologically correct feature maps. Biological cybernetics 43(1), 59-69 (1982)
-
(1982)
Biological cybernetics
, vol.43
, Issue.1
, pp. 59-69
-
-
Kohonen, T.1
-
5
-
-
84964411176
-
Real time data mining-based intrusion detection
-
1, pp
-
Lee, W., Stolfo, S., Chan, P., Eskin, E., Fan, W., Miller, M., Hershkop, S., Zhang, J.: Real time data mining-based intrusion detection. In: DARPA Information Survivability Conference & Exposition II, vol. 1, pp. 89-100 (2001)
-
(2001)
DARPA Information Survivability Conference & Exposition
, vol.2
, pp. 89-100
-
-
Lee, W.1
Stolfo, S.2
Chan, P.3
Eskin, E.4
Fan, W.5
Miller, M.6
Hershkop, S.7
Zhang, J.8
-
6
-
-
0036472459
-
Anomaly detection in embedded systems
-
Maxion, R., Tan, K.: Anomaly detection in embedded systems. IEEE Transactions on Computers 51(2), 108-120 (2002)
-
(2002)
IEEE Transactions on Computers
, vol.51
, Issue.2
, pp. 108-120
-
-
Maxion, R.1
Tan, K.2
-
8
-
-
17444432965
-
Hierarchical kohonenen net for anomaly detection in network security
-
Sarasamma, S., Zhu, Q., Huff, J.: Hierarchical kohonenen net for anomaly detection in network security. IEEE Transactions on Systems Man and Cybernetics Part B-Cybernetics 35(2), 302-312 (2005)
-
(2005)
IEEE Transactions on Systems Man and Cybernetics Part B-Cybernetics
, vol.35
, Issue.2
, pp. 302-312
-
-
Sarasamma, S.1
Zhu, Q.2
Huff, J.3
-
9
-
-
0037252253
-
Determining the operational limits of an anomaly-based intrusion detector
-
Tan, K., Maxion, R.: Determining the operational limits of an anomaly-based intrusion detector. IEEE Journal on Selected Areas in Communications 21(1), 96-110 (2003)
-
(2003)
IEEE Journal on Selected Areas in Communications
, vol.21
, Issue.1
, pp. 96-110
-
-
Tan, K.1
Maxion, R.2
-
10
-
-
17044378182
-
-
Wickramasinghe, L., Alahakoon, L.: Dynamic self organizing maps for discovery and sharing of knowledge in multi agent systems. Web Intelli. and Agent Sys. 3(1), 31-47 (2005)
-
Wickramasinghe, L., Alahakoon, L.: Dynamic self organizing maps for discovery and sharing of knowledge in multi agent systems. Web Intelli. and Agent Sys. 3(1), 31-47 (2005)
-
-
-
-
11
-
-
0036925621
-
Research on some problems in the kohonen som algorithm
-
Ying, H., Feng, T.-J., Cao, J.-K., Ding, X.-Q., Zhou, Y.-H.: Research on some problems in the kohonen som algorithm. In: International Conference on Machine Learning and Cybernetics, vol. 3, pp. 1279-1282 (2002)
-
(2002)
International Conference on Machine Learning and Cybernetics
, vol.3
, pp. 1279-1282
-
-
Ying, H.1
Feng, T.-J.2
Cao, J.-K.3
Ding, X.-Q.4
Zhou, Y.-H.5
-
12
-
-
9544250397
-
A multiagent data warehousing (madwh) and multiagent data mining (madm) approach to brain modeling and neurofuzzy control
-
Zhang, W.-R., Zhang, L.: A multiagent data warehousing (madwh) and multiagent data mining (madm) approach to brain modeling and neurofuzzy control. Inf. Sci. Inf. Comput. Sci. 167(1-4), 109-127 (2004)
-
(2004)
Inf. Sci. Inf. Comput. Sci
, vol.167
, Issue.1-4
, pp. 109-127
-
-
Zhang, W.-R.1
Zhang, L.2
|