메뉴 건너뛰기




Volumn , Issue , 2010, Pages 271-276

Evolving HMMs for network anomaly detection - Learning through evolutionary computation

Author keywords

Anomaly detection; Baum welch; GAs; HMMs

Indexed keywords

ANOMALY DETECTION; BAUM-WELCH; BAUM-WELCH ALGORITHMS; EVOLUTIONARY COMPUTATIONS; IN-NETWORK; NETWORK ANOMALY DETECTION; NUMBER OF STATE; STATISTICAL KNOWLEDGE;

EID: 77953043437     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICNS.2010.44     Document Type: Conference Paper
Times cited : (4)

References (13)
  • 2
    • 27144535913 scopus 로고    scopus 로고
    • Evolving hidden markov models for protein secondary structure prediction
    • September
    • K.-J. Won, T. Hamelryck, A. Prugel-Bennett, and A. Krogh, "Evolving hidden markov models for protein secondary structure prediction," Evolutionary Computation, IEEE, vol. 1, pp. 1-18, September 2005.
    • (2005) Evolutionary Computation, IEEE , vol.1 , pp. 1-18
    • Won, K.-J.1    Hamelryck, T.2    Prugel-Bennett, A.3    Krogh, A.4
  • 3
    • 77953035086 scopus 로고    scopus 로고
    • Optimizing hidden markov models using genetic algorithms and artificial immune systems
    • M. Korayem, A. Badr, and I. Farag, "Optimizing hidden markov models using genetic algorithms and artificial immune systems," Computing and Information Systems, vol. 11, no. 2, 2007.
    • (2007) Computing and Information Systems , vol.11 , Issue.2
    • Korayem, M.1    Badr, A.2    Farag, I.3
  • 4
    • 0024610919 scopus 로고
    • A tutorial on hidden markov models and selected applications in speech recognition
    • February
    • L. R. Rabiner, "A tutorial on hidden markov models and selected applications in speech recognition," Proceedings of the IEEE, vol. 77, no. 2, February 1989.
    • (1989) Proceedings of the IEEE , vol.77 , Issue.2
    • Rabiner, L.R.1
  • 6
    • 77953039682 scopus 로고    scopus 로고
    • Markovian models for sequential markovian models for sequencial data
    • Y. Bengio, "Markovian models for sequential markovian models for sequencial data," Statistical Science, 1997.
    • (1997) Statistical Science
    • Bengio, Y.1
  • 9
    • 77958047679 scopus 로고    scopus 로고
    • A hybrid speech recognition training method for hmm based on genetic algorithm and baum welch algorithm
    • X. Zhang, Y. Wang, and Z. Zhao, "A hybrid speech recognition training method for hmm based on genetic algorithm and baum welch algorithm," IEEE, pp. 572-572, 2007.
    • (2007) IEEE , pp. 572-572
    • Zhang, X.1    Wang, Y.2    Zhao, Z.3
  • 10
    • 84964461159 scopus 로고    scopus 로고
    • Mobile security agents for network traffic analysis
    • D. Dasgupta and H. Brian, "Mobile security agents for network traffic analysis," IEEE Transactions on Power Systems, vol. 2, no. 332-340, 2001.
    • (2001) IEEE Transactions on Power Systems , vol.2 , Issue.332-340
    • Dasgupta, D.1    Brian, H.2
  • 12
    • 34548722675 scopus 로고    scopus 로고
    • Anomaly detection via feature-aided tracking and hidden markov model
    • March
    • S. Singh, W. Donat, K. Pattipati, and P. Willet, "Anomaly detection via feature-aided tracking and hidden markov model," Aerospace Conference, IEEE, pp. 1-18, March 2007.
    • (2007) Aerospace Conference, IEEE , pp. 1-18
    • Singh, S.1    Donat, W.2    Pattipati, K.3    Willet, P.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.