-
1
-
-
80955163766
-
A hybridization of evolutionary fuzzy systems and ant colony optimization for intrusion detection
-
M.S. Abadeh, and J. Habibi A hybridization of evolutionary fuzzy systems and ant colony optimization for intrusion detection The ISC International Journal of Information Security 2 1 2010 33 46
-
(2010)
The ISC International Journal of Information Security
, vol.2
, Issue.1
, pp. 33-46
-
-
Abadeh, M.S.1
Habibi, J.2
-
2
-
-
77954967513
-
Induction of fuzzy classification systems via evolutionary ACO-based Algorithms
-
M.S. Abadeh, J. Habibi, and E. Soroush Induction of fuzzy classification systems via evolutionary ACO-based Algorithms International Journal of Simulation, Systems, Science, Technology 9 3 2008
-
(2008)
International Journal of Simulation, Systems, Science, Technology
, vol.9
, Issue.3
-
-
Abadeh, M.S.1
Habibi, J.2
Soroush, E.3
-
9
-
-
34250351345
-
Intrusion detection in sensor networks using emotional ants
-
S. Banerjee, C. Grosan, A. Abraham, and P.K. Mahanti Intrusion detection in sensor networks using emotional ants International Journal of Applied Science and Computations 12 3 2005 152 173
-
(2005)
International Journal of Applied Science and Computations
, vol.12
, Issue.3
, pp. 152-173
-
-
Banerjee, S.1
Grosan, C.2
Abraham, A.3
Mahanti, P.K.4
-
11
-
-
27144489164
-
A tutorial on support vector machines for pattern recognition
-
C.J.C. Burges A tutorial on support vector machines for pattern recognition Knowledge Discovery and Data Mining 2 2 1998 121 167 (Pubitemid 128695475)
-
(1998)
Data Mining and Knowledge Discovery
, vol.2
, Issue.2
, pp. 121-167
-
-
Burges, C.J.C.1
-
16
-
-
80955158667
-
-
Retrieved January 26
-
The DARPA-Lincoln Dataset. Retrieved January 26, 2008, from http://www.ll.mit.edu/IST/ideval/data/data-index.html.
-
(2008)
The DARPA-Lincoln Dataset
-
-
-
17
-
-
0003068867
-
The dynamics of collective sorting robot-like ants and ant-like robots
-
Deneubourg JL, Goss S, Franks N, Sendova Franks A, Detrain C, Chretien L. The dynamics of collective sorting robot-like ants and ant-like robots. In: Proceedings of the First International Conference on Simulation of Adaptive Behavior: From Animals to Animats. 1990a. p.356-363.
-
(1990)
Proceedings of the First International Conference on Simulation of Adaptive Behavior: From Animals to Animats
, pp. 356-363
-
-
Deneubourg, J.L.1
Goss, S.2
Franks, N.3
Sendova Franks, A.4
Detrain, C.5
Chretien, L.6
-
18
-
-
0001106375
-
The self-organizing exploratory pattern of the Argentine ant
-
J.L. Deneubourg, S. Aron, S. Goss, and J.-M. Pasteels The self-organizing exploratory pattern of the Argentine ant Journal of Insect Behavior 3 1 1990 159 168
-
(1990)
Journal of Insect Behavior
, vol.3
, Issue.1
, pp. 159-168
-
-
Deneubourg, J.L.1
Aron, S.2
Goss, S.3
Pasteels, J.-M.4
-
24
-
-
33846814873
-
Vulnerability analysis of immunity-based intrusion detection systems using genetic and evolutionary hackers
-
DOI 10.1016/j.asoc.2006.05.001, PII S1568494606000512
-
G. Dozier, D. Brown, H. Hou, and J. Hurley Vulnerability analysis of immunity-based intrusion detection systems using genetic and evolutionary hackers Applied Soft Computing 7 2 2007 547 553 (Pubitemid 46205472)
-
(2007)
Applied Soft Computing Journal
, vol.7
, Issue.2
, pp. 547-553
-
-
Dozier, G.1
Brown, D.2
Hou, H.3
Hurley, J.4
-
25
-
-
77949551669
-
Intrusion detection system based on support vector machine and active learning
-
D. Duan, S. Chen, and W. Yang Intrusion detection system based on support vector machine and active learning Computer: Engineering 2007
-
(2007)
Computer: Engineering
-
-
Duan, D.1
Chen, S.2
Yang, W.3
-
26
-
-
0038428854
-
Results of the KDD'99 classifier learning contest. SIGKDD
-
C. Elkan Results of the KDD'99 classifier learning contest. SIGKDD Explor. Newsl 1 2 1999 63 64
-
(1999)
Explor. Newsl
, vol.1
, Issue.2
, pp. 63-64
-
-
Elkan, C.1
-
28
-
-
28444457043
-
An unsupervised anomaly intrusion detection algorithm based on swarm intelligence
-
2005 International Conference on Machine Learning and Cybernetics, ICMLC 2005
-
Feng Y, Wu ZF, Wu KG, Xiong ZY, Zhou Y. An unsupervised anomaly intrusion detection algorithm based on swarm intelligence. In: the Proceedings of the Fourth International Conference on Machine Learning and Cybernetics. 2005. p.3965-3969. (Pubitemid 41734605)
-
(2005)
2005 International Conference on Machine Learning and Cybernetics, ICMLC 2005
, pp. 3965-3969
-
-
Feng, Y.1
Wu, Z.-F.2
Wu, K.-G.3
Xiong, Z.-Y.4
Zhou, Y.5
-
29
-
-
34547543189
-
Clustering based on self-organizing ant colony networks with application to intrusion detection
-
DOI 10.1109/ISDA.2006.253761, 4021813, Proceedings - ISDA 2006: Sixth International Conference on Intelligent Systems Design and Applications
-
Feng Y, Zhong J, Ye CY, Wu ZF. Clustering based on self-organizing ant colony networks with application to intrusion detection. In: Proceedings of the Sixth International Conference on Intelligent Systems Design and Applications (ISDA '06). 2006. p.1077-1080. (Pubitemid 47179196)
-
(2006)
Proceedings - ISDA 2006: Sixth International Conference on Intelligent Systems Design and Applications
, vol.2
, pp. 1077-1080
-
-
Feng, Y.1
Zhong, J.2
Ye, C.-X.3
Wu, Z.-F.4
-
30
-
-
80955163765
-
Intrusion detection classifier based on dynamic SOM and swarm intelligence clustering
-
Y. Feng, J. Zhong, Z. Xiong, C.Y. Ye, and K.G. Wu Intrusion detection classifier based on dynamic SOM and swarm intelligence clustering Advances in Congnitive Neurodynamics ICCN 2007 969 974
-
(2007)
Advances in Congnitive Neurodynamics ICCN
, pp. 969-974
-
-
Feng, Y.1
Zhong, J.2
Xiong, Z.3
Ye, C.Y.4
Wu, K.G.5
-
31
-
-
37249089471
-
Network anomaly detection based on DSOM and ACO clustering
-
Advances in Neural Networks - ISNN 2007 - 4th International Symposium on Neural Networks, ISNN 2007, Proceedings
-
Y. Feng, Z. Zhong, Z.-Y. Xiong, C.-X. Ye, and K.-G. Wu Network anomaly detection based on DSOM and ACO clustering Advances in Neural Networks 2007 947 955 (Pubitemid 350270146)
-
(2007)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4492
, Issue.PART 2
, pp. 947-955
-
-
Feng, Y.1
Zhong, J.2
Xiong, Z.-Y.3
Ye, C.-X.4
Wu, K.-G.5
-
32
-
-
84971386868
-
Flocks, herds, and schools: A distributed behavioral model
-
RG Reynolds Flocks, herds, and schools: a distributed behavioral model Computer Graphics 21 4 1987 25 34
-
(1987)
Computer Graphics
, vol.21
, Issue.4
, pp. 25-34
-
-
Rg, R.1
-
38
-
-
0024827650
-
Self-organized shortcuts in the Argentine ant
-
S. Goss, S. Aron, J.L. Deneubourg, and J.M. Pasteels Self-organized shortcuts in the Argentine ant Naturwissenschaften 76 12 1989 579 581 (Pubitemid 20073252)
-
(1989)
Naturwissenschaften
, vol.76
, Issue.12
, pp. 579-581
-
-
Goss, S.1
Aron, S.2
Deneubourg, J.L.3
Pasteels, J.M.4
-
43
-
-
0033329971
-
Improving the performance of fuzzy classifier systems for pattern classification problems with continuous attributes
-
DOI 10.1109/41.807986
-
H. Ishibuchi, and T. Nakashima Improving the performance of fuzzy classifier systems for pattern classification problems with continuous attributes IEEE Transactions on Industrial Electronics 46 6 1999 1057 1068 (Pubitemid 30527844)
-
(1999)
IEEE Transactions on Industrial Electronics
, vol.46
, Issue.6
, pp. 1057-1068
-
-
Ishibuchi, H.1
Nakashima, T.2
-
44
-
-
80955163758
-
Performance evaluation of fuzzy classifier systems for multi-dimensional pattern classification problems. IEEE Transactions on Systems
-
H. Ishibuchi, T. Nakashima, and T. Muratam Performance evaluation of fuzzy classifier systems for multi-dimensional pattern classification problems. IEEE Transactions on Systems Man and Cybernetics 21 5 1999 61 68
-
(1999)
Man and Cybernetics
, vol.21
, Issue.5
, pp. 61-68
-
-
Ishibuchi, H.1
Nakashima, T.2
Muratam, T.3
-
51
-
-
80955158626
-
-
Retrieved January 26
-
The KDD99 Dataset. Retrieved January 26, 2008, from http://kdd.ics.uci. edu/databases/kddcup99/task.html.
-
(2008)
The KDD99 Dataset
-
-
-
54
-
-
35449005874
-
Immune system approaches to intrusion detection - A review
-
DOI 10.1007/s11047-006-9026-4
-
J. Kim, P.J. Bentley, U. Aickelin, J. Greensmith, G. Tedesco, and J. Twycross Immune system approaches to intrusion detection - a review Natural Computing 6 4 2007 413 466 (Pubitemid 47629391)
-
(2007)
Natural Computing
, vol.6
, Issue.4
, pp. 413-466
-
-
Kim, J.1
Bentley, P.J.2
Aickelin, U.3
Greensmith, J.4
Tedesco, G.5
Twycross, J.6
-
59
-
-
0034301517
-
The 1999 DARPA off-line intrusion detection evaluation
-
R. Lippmann, J.W. Haines, J.D. Fried, J. Korba, and K. Das The 1999 DARPA off-line intrusion detection evaluation Computer Networks 34 4 2000 579 595
-
(2000)
Computer Networks
, vol.34
, Issue.4
, pp. 579-595
-
-
Lippmann, R.1
Haines, J.W.2
Fried, J.D.3
Korba, J.4
Das, K.5
-
64
-
-
76449122009
-
Wavelet fuzzy neural network based on modified QPSO for network anomaly detection
-
R.-H. Ma, and Y. Liu Wavelet fuzzy neural network based on modified QPSO for network anomaly detection Applied Mechanics and Materials 20-23 2010 1378 1384
-
(2010)
Applied Mechanics and Materials
, vol.2023
, pp. 1378-1384
-
-
Ma, R.-H.1
Liu, Y.2
-
67
-
-
49249132924
-
Network anomaly detection using RBF neural network with hybrid QPSO
-
Ma R, Liu Y, Lin X, Wang Z. Network anomaly detection using RBF neural network with hybrid QPSO. In: Proceedings of the IEEE International Conference on Networking, Sensing and Control 2008b. p. 1284-1287.
-
(2008)
Proceedings of the IEEE International Conference on Networking, Sensing and Control
, pp. 1284-1287
-
-
Ma, R.1
Liu, Y.2
Lin, X.3
Wang, Z.4
-
70
-
-
85019691440
-
Testing intrusion detection systems: A critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory
-
J. McHugh Testing intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory ACM Transactions on Information and System Security (TISSEC) 3 4 2000 262 294
-
(2000)
ACM Transactions on Information and System Security (TISSEC)
, vol.3
, Issue.4
, pp. 262-294
-
-
McHugh, J.1
-
72
-
-
0027205884
-
A scaled conjugate gradient algorithm for fast supervised learning
-
M.F. Moller A scaled conjugate gradient algorithm for fast supervised learning Neural Networks 6 4 1993 525 533
-
(1993)
Neural Networks
, vol.6
, Issue.4
, pp. 525-533
-
-
Moller, M.F.1
-
80
-
-
53849148915
-
FORK: A novel two-pronged strategy for an agent-based intrusion detection scheme in ad-hoc networks
-
C. Ramachandran, S. Misra, and M.S. Obaidat FORK: a novel two-pronged strategy for an agent-based intrusion detection scheme in ad-hoc networks Computer Communications 31 16 2008 3855 3869
-
(2008)
Computer Communications
, vol.31
, Issue.16
, pp. 3855-3869
-
-
Ramachandran, C.1
Misra, S.2
Obaidat, M.S.3
-
82
-
-
49649112245
-
Why machine learning algorithms fail in misuse detection on KDD intrusion detection data set
-
M. Sabhnani, and G. Serpen Why machine learning algorithms fail in misuse detection on KDD intrusion detection data set Journal of Intelligent Data Analysis 8 4 2004 403 415
-
(2004)
Journal of Intelligent Data Analysis
, vol.8
, Issue.4
, pp. 403-415
-
-
Sabhnani, M.1
Serpen, G.2
-
84
-
-
0036083194
-
Automated generation and analysis of attack graphs
-
Sheyner O, Haines J, Jha S, Lippmann R, Wing JM. Automated generation and analysis of attack graphs. In: Proceedings of the 2002 IEEE Symposium on Security and Privacy 2002. p. 273-284. (Pubitemid 34648119)
-
(2002)
Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy
, pp. 273-284
-
-
Sheyner, O.1
Haines, J.2
Jha, S.3
Lippmann, R.4
Wing, J.M.5
-
85
-
-
33845621875
-
A hybrid approach for feature subset selection using neural networks and ant colony optimization
-
DOI 10.1016/j.eswa.2006.04.010, PII S0957417406001187
-
R.K. Sivagaminathan, and S. Ramakrishnan A hybrid approach for feature subset selection using neural networks and ant colony optimization Expert Systems with Applications 33 1 2007 49 60 (Pubitemid 44959916)
-
(2007)
Expert Systems with Applications
, vol.33
, Issue.1
, pp. 49-60
-
-
Sivagaminathan, R.K.1
Ramakrishnan, S.2
-
89
-
-
80955142846
-
-
(Online Material)
-
Swarm Intelligence in Intrusion Detection: A Survey (Online Material), http://www.icsd.aegean.gr/postgraduates/kkolias/swarm-intelligence-in-intrusion- detection/online-resources.pdf
-
Swarm Intelligence in Intrusion Detection: A Survey
-
-
-
95
-
-
33847299487
-
Multi-agent intrusion detection system in industrial network using ant colony clustering approach and unsupervised feature extraction
-
Tsang CH, Kwong S. Multi-agent intrusion detection system in industrial network using ant colony clustering approach and unsupervised feature extraction. In: Proceedings of the IEEE International Conference on Industrial Technology 2005 (ICIT 2005). p.51-56.
-
(2005)
Proceedings of the IEEE International Conference on Industrial Technology (ICIT 2005)
, pp. 51-56
-
-
Ch, T.1
Kwong, S.2
-
96
-
-
33846318873
-
Ant colony clustering and feature extraction for anomaly intrusion detection
-
W. Tsang, and S. Kwong Ant colony clustering and feature extraction for anomaly intrusion detection Swarm Intelligence in Data Mining 2006 101 121
-
(2006)
Swarm Intelligence in Data Mining
, pp. 101-121
-
-
Tsang, W.1
Kwong, S.2
-
97
-
-
80955163750
-
-
Retrieved January 26, 2008
-
The Unix User Dataset. Retrieved January 26, 2008, from http://kdd.ics.uci.edu/databases/UNIX-user-data/UNIX-user-data.htm.
-
The Unix User Dataset
-
-
-
99
-
-
27544463917
-
A clustering algorithm for intrusion detection
-
DOI 10.1117/12.603567, 04, Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005
-
Wang Q, Megalooikonomou V. A clustering algorithm for intrusion detection. In: Proceedings of the SPIE Conference on Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005. p.31-38. (Pubitemid 41545369)
-
(2005)
Proceedings of SPIE - The International Society for Optical Engineering
, vol.5812
, pp. 31-38
-
-
Wang, Q.1
Megalooikonomou, V.2
-
103
-
-
70350134739
-
The use of computational intelligence in intrusion detection systems: A review
-
S.X. Wu, and W. Banzhaf The use of computational intelligence in intrusion detection systems: a review Applied Soft Computing 10 1 2010 1 35
-
(2010)
Applied Soft Computing
, vol.10
, Issue.1
, pp. 1-35
-
-
Wu, S.X.1
Banzhaf, W.2
-
105
-
-
1842815887
-
Security in mobile ad hoc networks: Challenges and solutions
-
H. Yang, H. Luo, F. Ye, S. Lu, and L. Zhang Security in mobile ad hoc networks: challenges and solutions IEEE Wireless Communications 11 1 2004 38 47
-
(2004)
IEEE Wireless Communications
, vol.11
, Issue.1
, pp. 38-47
-
-
Yang, H.1
Luo, H.2
Ye, F.3
Lu, S.4
Zhang, L.5
-
107
-
-
34248666540
-
Fuzzy sets
-
Zadeh LA. Fuzzy sets. Inf. Control 8 1965. p. 338-353.
-
(1965)
Inf. Control
, vol.8
, pp. 338-353
-
-
Zadeh, L.A.1
|