메뉴 건너뛰기




Volumn 263, Issue , 2010, Pages 485-513

Neural network and artificial immune systems for malware and network intrusion detection

Author keywords

[No Author keywords available]

Indexed keywords


EID: 74049104498     PISSN: 1860949X     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-3-642-05179-1_23     Document Type: Article
Times cited : (23)

References (49)
  • 2
    • 0027327114 scopus 로고
    • How the immune system recognizers invaders
    • Janeway, C.A.: How the Immune System Recognizers Invaders. Scientific American 269(3), 72-79 (1993)
    • (1993) Scientific American , vol.269 , Issue.3 , pp. 72-79
    • Janeway, C.A.1
  • 4
    • 84901516967 scopus 로고    scopus 로고
    • Computer virus, http://en.wikipedia.org/wiki/Computer-virus
    • Computer Virus
  • 8
    • 0027327114 scopus 로고
    • How the immune system recognizers invaders
    • Janeway, C.A.: How the Immune System Recognizers Invaders. Scientific American 269(3), 72-79 (1993)
    • (1993) Scientific American , vol.269 , Issue.3 , pp. 72-79
    • Janeway, C.A.1
  • 17
    • 0034546374 scopus 로고    scopus 로고
    • Architecture for an artificial immune system
    • Hofmeyr, S., Forrest, S.: Architecture for an artificial immune system. EvolutionaryComputation 8(4), 443-473 (2000)
    • (2000) EvolutionaryComputation , vol.8 , Issue.4 , pp. 443-473
    • Hofmeyr, S.1    Forrest, S.2
  • 19
    • 0020068152 scopus 로고
    • Self-organized formation of topologically correct feature maps
    • Kohonen, T.: Self-organized Formation of Topologically Correct Feature Maps. Biological Cybernetics 43, 59-69 (1982)
    • (1982) Biological Cybernetics , vol.43 , pp. 59-69
    • Kohonen, T.1
  • 22
    • 74049141572 scopus 로고    scopus 로고
    • Kaspersky Lab: Antivirus software (2008), http://www.kaspersky.com
    • (2008) Antivirus Software
  • 26
    • 74049157906 scopus 로고    scopus 로고
    • SNORT, http://www.snort.org
  • 31
    • 84885774862 scopus 로고    scopus 로고
    • A Framework for constructing features and models for intrusion detection systems
    • Lee, W., Stolfo, S.: A Framework for constructing features and models for intrusion detection systems. ACM Transactions on Information and System Security 3(4), 227-261 (2000)
    • (2000) ACM Transactions on Information and System Security , vol.3 , Issue.4 , pp. 227-261
    • Lee, W.1    Stolfo, S.2
  • 32
    • 1842712339 scopus 로고    scopus 로고
    • A genetic clustering method for intrusion detection
    • Liu, Y., Chen, K., Liao, X., et al.: A genetic clustering method for intrusion detection. Pattern Recognition 37(5), 927-934 (2004)
    • (2004) Pattern Recognition , vol.37 , Issue.5 , pp. 927-934
    • Liu, Y.1    Chen, K.2    Liao, X.3
  • 34
    • 27144518261 scopus 로고    scopus 로고
    • Proceedings of the IEEE Foundations and New Directions of Data Mining Workshop, in conjunction with the Third IEEE International Conference on Data Mining (ICDM 2003)
    • Shyu, M., Chen, S., Sarinnapakorn, K., Chang, L.: A Novel Anomaly Detection Scheme Based on Principal Component Classifier. In: Proceedings of the IEEE Foundations and New Directions of Data Mining Workshop, in conjunction with the Third IEEE International Conference on Data Mining (ICDM 2003), pp. 172-179 (2003)
    • (2003) A Novel Anomaly Detection Scheme Based on Principal Component Classifier , pp. 172-179
    • Shyu, M.1    Chen, S.2    Sarinnapakorn, K.3    Chang, L.4
  • 37
    • 74049125753 scopus 로고    scopus 로고
    • KDD Cup Competition 1999, http://kdd.ics.uci.edu/databases/kddcup99/ kddcup99.html
    • (1999) KDD Cup Competition
  • 39
    • 84864859588 scopus 로고    scopus 로고
    • Outlier detection using replicator neural networks
    • Kambayashi, Y., Winiwarter, W., Arikawa, M. (eds.) DaWaK 2002 Springer, Heidelberg
    • Hawkins, S., He, H., Williams, G., Baxter, R.: Outlier Detection Using Replicator Neural Networks. In: Kambayashi, Y., Winiwarter, W., Arikawa, M. (eds.) DaWaK 2002. LNCS, vol.2454, pp. 170-180. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2454 , pp. 170-180
    • Hawkins, S.1    He, H.2    Williams, G.3    Baxter, R.4
  • 42
    • 0038330235 scopus 로고    scopus 로고
    • Fusion of multiple classifiers for intrusion detection in computer networks
    • DOI 10.1016/S0167-8655(03)00004-7
    • Giacinto, G., Roli, F., Didaci, L.: Fusion of multiple classifiers for intrusion detection in computer networks. Pattern Recognition Letters 24, 1795 - 1803 (2003) (Pubitemid 36558001)
    • (2003) Pattern Recognition Letters , vol.24 , Issue.12 , pp. 1795-1803
    • Giacinto, G.1    Roli, F.2    Didaci, L.3
  • 43
    • 0033888682 scopus 로고    scopus 로고
    • Selection of image classifier
    • Giacinto, G., Roli, F., Fumera, G.: Selection of image classifier. Electron 26(5), 420-422 (2000)
    • (2000) Electron , vol.26 , Issue.5 , pp. 420-422
    • Giacinto, G.1    Roli, F.2    Fumera, G.3
  • 47
    • 0026954958 scopus 로고
    • Principal components, minor components and linear networks
    • Oja, E.: Principal components, minor components and linear networks. Neural Networks 5, 927-935 (1992)
    • (1992) Neural Networks , vol.5 , pp. 927-935
    • Oja, E.1
  • 48
    • 0002552358 scopus 로고
    • Improving performance in neural networks using a boosting algorithm
    • Hanson, S.J., Cowan, J.D., Giles, C.L. (eds.) Denver, CO Morgan Kaufmann, San Mateo
    • Drucker, H., Schapire, R., Simard, P.: Improving performance in neural networks using a boosting algorithm. In: Hanson, S.J., Cowan, J.D., Giles, C.L. (eds.) Advanced in Neural Information Processing Systems, Denver, CO, vol.5, pp. 42-49. Morgan Kaufmann, San Mateo (1993)
    • (1993) Advanced in Neural Information Processing Systems , vol.5 , pp. 42-49
    • Drucker, H.1    Schapire, R.2    Simard, P.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.