-
2
-
-
27144507060
-
Intrussion Detection in Computer networks with Neural and Fuzzy classifiers
-
Kaynak, O., Alpaydin, E., Oja, E., Xu, L. (eds.) ICANN 2003 and ICONIP 2003. Springer, Heidelberg
-
Hoffman, A., Schimitz, C., Sick, B.: Intrussion Detection in Computer networks with Neural and Fuzzy classifiers. In: Kaynak, O., Alpaydin, E., Oja, E., Xu, L. (eds.) ICANN 2003 and ICONIP 2003. LNCS, vol. 2714, Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2714
-
-
Hoffman, A.1
Schimitz, C.2
Sick, B.3
-
4
-
-
15944375471
-
Intrusion Detection using hierarchical neural networks
-
Zhang, C., Jiang, J., Kamel, M.: Intrusion Detection using hierarchical neural networks. Pattern Recognition Letters 26, 779-791 (2005)
-
(2005)
Pattern Recognition Letters
, vol.26
, pp. 779-791
-
-
Zhang, C.1
Jiang, J.2
Kamel, M.3
-
6
-
-
77950036364
-
On the versatility of radial basis function neural networks: A case study in the field of intrusion detection
-
Fisch, D., Hofmann, A., Sick, B.: On the versatility of radial basis function neural networks: A case study in the field of intrusion detection. Inf. Sci. 180(12), 2421-2439 (2010)
-
(2010)
Inf. Sci.
, vol.180
, Issue.12
, pp. 2421-2439
-
-
Fisch, D.1
Hofmann, A.2
Sick, B.3
-
7
-
-
0036859375
-
The Growing Hierarchical Self-Organizing Map: Explorarory Analysis of High-Dimensional Data
-
Rauber, A., Merkl, D., Dittenbach, M.: The Growing Hierarchical Self-Organizing Map: Explorarory Analysis of High-Dimensional Data. IEEE Transactions on Neural Network 13(6) (2002)
-
(2002)
IEEE Transactions on Neural Network
, vol.13
, Issue.6
-
-
Rauber, A.1
Merkl, D.2
Dittenbach, M.3
-
8
-
-
67650490968
-
Attack Classification based on data mining technique and its application for reliable medical sensor communication
-
Oh, H., Doh, I., Chae, K.: Attack Classification based on data mining technique and its application for reliable medical sensor communication. International Journal Of Science and Applications 6(3), 20-32 (2009)
-
(2009)
International Journal of Science and Applications
, vol.6
, Issue.3
, pp. 20-32
-
-
Oh, H.1
Doh, I.2
Chae, K.3
-
10
-
-
79957969805
-
Feature Reduction using Principal Component Analysis for Effective Anomaly-Based Intrusion Detection on NSL-KDD
-
Lakhina, S., Joseph, S., Verma, B.: Feature Reduction using Principal Component Analysis for Effective Anomaly-Based Intrusion Detection on NSL-KDD. International Journal on Engineering Science and Technology 2(6), 1790-1799 (2010)
-
(2010)
International Journal on Engineering Science and Technology
, vol.2
, Issue.6
, pp. 1790-1799
-
-
Lakhina, S.1
Joseph, S.2
Verma, B.3
-
14
-
-
78650756799
-
Network security using growing hierarchical self-organizing maps
-
Kolehmainen, M., Toivanen, P., Beliczynski, B. (eds.) ICANNGA 2009. Springer, Heidelberg
-
Palomo, E.J., Domínguez, E., Luque, R.M., Muñoz, J.: Network security using growing hierarchical self-organizing maps. In: Kolehmainen, M., Toivanen, P., Beliczynski, B. (eds.) ICANNGA 2009. LNCS, vol. 5495, pp. 130-139. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5495
, pp. 130-139
-
-
Palomo, E.J.1
Domínguez, E.2
Luque, R.M.3
Muñoz, J.4
-
18
-
-
78650756799
-
Network Security Using Growing Hierarchical Self-Organizing Maps
-
Kolehmainen, M., Toivanen, P., Beliczynski, B. (eds.) ICANNGA 2009. Springer, Heidelberg
-
Palomo, E.J., Domínguez, E., Luque, R.M., Muñoz, J.: Network Security Using Growing Hierarchical Self-Organizing Maps. In: Kolehmainen, M., Toivanen, P., Beliczynski, B. (eds.) ICANNGA 2009. LNCS, vol. 5495, pp. 130-139. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5495
, pp. 130-139
-
-
Palomo, E.J.1
Domínguez, E.2
Luque, R.M.3
Muñoz, J.4
|