-
1
-
-
33750528950
-
Intrusion detection using a fuzzy genetics-based learning algorithm
-
DOI 10.1016/j.jnca.2005.05.002, PII S1084804505000305, Network and Information Security: A Computational Intelligence Approach
-
M.S. Abadeh, J. Habibi, and C. Lucas Intrusion detection using a fuzzy genetics-based learning algorithm Journal of Network and Computer Applications 30 1 2007 414 428 (Pubitemid 44666474)
-
(2007)
Journal of Network and Computer Applications
, vol.30
, Issue.1
, pp. 414-428
-
-
Abadeh, M.S.1
Habibi, J.2
Lucas, C.3
-
5
-
-
68949196337
-
A program-based anomaly intrusion detection scheme using multiple detection engines and fuzzy inference
-
X.D. Hoang, J. Hu, and P. Bertok A program-based anomaly intrusion detection scheme using multiple detection engines and fuzzy inference Journal of Network and Computer Applications 32 6 2009 1219 1228
-
(2009)
Journal of Network and Computer Applications
, vol.32
, Issue.6
, pp. 1219-1228
-
-
Hoang, X.D.1
Hu, J.2
Bertok, P.3
-
11
-
-
54949111696
-
The adaptive neuro-fuzzy model for forecasting the domestic debt
-
A. Keles, M. Kolcak, and A. Keles The adaptive neuro-fuzzy model for forecasting the domestic debt Knowledge-Based-Systems 21 8 2008 951 957
-
(2008)
Knowledge-Based-Systems
, vol.21
, Issue.8
, pp. 951-957
-
-
Keles, A.1
Kolcak, M.2
Keles, A.3
-
12
-
-
18844395404
-
A multi-model approach to the detection of web-based attacks
-
DOI 10.1016/j.comnet.2005.01.009, PII S1389128605000083, Web Traffic
-
C. Kruegel, G. Vigna, and W. Robertson A multi-model approach to the detection of web-based attacks Journal of Computer Networks 48 5 2005 717 738 (Pubitemid 40684159)
-
(2005)
Computer Networks
, vol.48
, Issue.5
, pp. 717-738
-
-
Kruegel, C.1
Vigna, G.2
Robertson, W.3
-
13
-
-
78650169163
-
The use of artificial intelligence based techniques for intrusion detection: A review
-
G. Kumar, K. Kumar, and M. Sachdeva The use of artificial intelligence based techniques for intrusion detection: a review Artificial Intelligence Review 34 4 2010 369 387
-
(2010)
Artificial Intelligence Review
, vol.34
, Issue.4
, pp. 369-387
-
-
Kumar, G.1
Kumar, K.2
Sachdeva, M.3
-
14
-
-
33947265868
-
Using multiple uncertain examples and adaptative fuzzy reasoning to optimize image characterization
-
DOI 10.1016/j.knosys.2006.05.018, PII S0950705106001420
-
L. Lancieri, and L. Boubchir Using multiple uncertain examples and adaptive fuzzy reasoning to optimize image characterization Knowledge-Based- Systems 20 3 2007 266 276 (Pubitemid 46436463)
-
(2007)
Knowledge-Based Systems
, vol.20
, Issue.3
, pp. 266-276
-
-
Lancieri, L.1
Boubchir, L.2
-
16
-
-
38949087920
-
Design and Implementation of an XML Firewall
-
Y.S. Loh, W.C. Yau, C.T. Wong, W.C. Ho, Design and Implementation of an XML Firewall, Proceedings of the 2006 International Conference on Computational Intelligence and Security (CIS2006), 2006, pp. 1147-1150.
-
(2006)
Proceedings of the 2006 International Conference on Computational Intelligence and Security (CIS2006)
, pp. 1147-1150
-
-
Loh, Y.S.1
Yau, W.C.2
Wong, C.T.3
Ho, W.C.4
-
20
-
-
33750512162
-
Intrusion detection by integrating boosting genetic fuzzy classifier and data mining criteria for rule pre-screening
-
DOI 10.1016/j.jnca.2005.06.002, PII S1084804505000433, Network and Information Security: A Computational Intelligence Approach
-
T. Ozyer, R. Alhajj, and K. Barker Intrusion detection by integrating boosting genetic fuzzy classifier and data mining criteria for rule pre-screening Journal of Network and Computer Applications 30 1 2007 99 113 (Pubitemid 44666485)
-
(2007)
Journal of Network and Computer Applications
, vol.30
, Issue.1
, pp. 99-113
-
-
Ozyer, T.1
Alhajj, R.2
Barker, K.3
-
21
-
-
33750514606
-
Modeling intrusion detection system using hybrid intelligent systems
-
DOI 10.1016/j.jnca.2005.06.003, PII S1084804505000445, Network and Information Security: A Computational Intelligence Approach
-
S. Peddabachigari, A. Abraham, C. Grosan, and J. Thomas Modeling intrusion detection system using hybrid intelligent systems Journal of Network and Computer Applications 30 1 2007 114 132 (Pubitemid 44666486)
-
(2007)
Journal of Network and Computer Applications
, vol.30
, Issue.1
, pp. 114-132
-
-
Peddabachigari, S.1
Abraham, A.2
Grosan, C.3
Thomas, J.4
-
22
-
-
79151480916
-
S-MAS: An adaptive hierarchical distributed multi-agent architecture for blocking malicious SOAP messages within Web Services environments
-
C.I. Pinzón, J. Bajo, J.F. De Paz, and J.M. Corchado S-MAS: an adaptive hierarchical distributed multi-agent architecture for blocking malicious SOAP messages within Web Services environments Expert Systems with Applications 38 2011 5486 5499
-
(2011)
Expert Systems with Applications
, vol.38
, pp. 5486-5499
-
-
Pinzón, C.I.1
Bajo, J.2
De Paz, J.F.3
Corchado, J.M.4
-
23
-
-
84866514695
-
Detection and mitigation of web services attacks using markov model
-
V. Relan, B. Sonawane, Detection and Mitigation of Web Services Attacks Using Markov Model. CMSC 678: Machine Learning Project, 2009. < http://userpages.umbc.edu/~relan1/CMSC%20678%20Project%20Report.pdf >.
-
(2009)
CMSC 678: Machine Learning Project
-
-
Relan, V.1
Sonawane, B.2
-
24
-
-
83455223163
-
Using generalization and characterization techniques in the anomaly-based web attacks
-
W. Robertson, G. Vigna, C. Kruegel, R.A. Kemmerer, Using Generalization and Characterization Techniques in the Anomaly-based Web Attacks, The 13th Annual Network and Distributed System Security Symposium (NDSS), 2006. < http://www.isoc.org/isoc/conferences/ndss/06/proceedings/papers/ anomaly-signatures.pdf >.
-
(2006)
The 13th Annual Network and Distributed System Security Symposium (NDSS)
-
-
Robertson, W.1
Vigna, G.2
Kruegel, C.3
Kemmerer, R.A.4
-
25
-
-
79952059044
-
Misuse detection using hybrid of association rule mining and connectionist modeling
-
Special Issue of Computer & IT
-
M. Sheikhan, and Z. Jadidi Misuse detection using hybrid of association rule mining and connectionist modeling World Applied Sciences Journal 7 2009 31 37 Special Issue of Computer & IT
-
(2009)
World Applied Sciences Journal
, vol.7
, pp. 31-37
-
-
Sheikhan, M.1
Jadidi, Z.2
-
26
-
-
84861522257
-
Misuse detection based on feature selection by fuzzy association rule mining
-
Special Issue of Computer & Electrical Engineering
-
M. Sheikhan, and M.S. Rad Misuse detection based on feature selection by fuzzy association rule mining World Applied Sciences Journal 10 2010 32 40 Special Issue of Computer & Electrical Engineering
-
(2010)
World Applied Sciences Journal
, vol.10
, pp. 32-40
-
-
Sheikhan, M.1
Rad, M.S.2
-
28
-
-
77957577501
-
Detection and classification of DDoS attacks using fuzzy inference system
-
T. Subbulakshmi, S.M. Shalinie, C.S. Reddy, and A. Ramamoorthi Detection and classification of DDoS attacks using fuzzy inference system Recent Trends in Network Security and Applications, Communications in Computer and Information Science 89 P1 2010 242 252
-
(2010)
Recent Trends in Network Security and Applications, Communications in Computer and Information Science
, vol.89
, Issue.P1
, pp. 242-252
-
-
Subbulakshmi, T.1
Shalinie, S.M.2
Reddy, C.S.3
Ramamoorthi, A.4
-
29
-
-
79251595062
-
Using clustering to improve the KNN-based classifiers for online anomaly network traffic identification
-
M.Y. Su Using clustering to improve the KNN-based classifiers for online anomaly network traffic identification Journal of Network and Computer Applications 34 2 2011 722 730
-
(2011)
Journal of Network and Computer Applications
, vol.34
, Issue.2
, pp. 722-730
-
-
Su, M.Y.1
-
30
-
-
34748892899
-
A novel soft computing model using adaptive neuro-fuzzy inference system for intrusion detection
-
DOI 10.1109/ICNSC.2007.372889, 4239102, 2007 IEEE International Conference on Networking, Sensing and Control, ICNSC'07
-
A.N. Toosi, M. Kahani, A novel soft computing model using adaptive neuro-fuzzy inference system for intrusion detection, IEEE International Conference on Networking, Sensing and Control, London, UK, 2007, pp. 834-839. (Pubitemid 47468901)
-
(2007)
2007 IEEE International Conference on Networking, Sensing and Control, ICNSC'07
, pp. 834-839
-
-
Toosi, A.N.1
Kahani, M.2
-
32
-
-
84866479090
-
-
wsKnight
-
wsKnight. < http://net-square.com/wschess/index.html >.
-
-
-
-
33
-
-
77549083226
-
Note-against-note two-voice counterpoint by means of fuzzy logic
-
A.E. Yilmaz, and Z. Telatar Note-against-note two-voice counterpoint by means of fuzzy logic Knowledge-Based-Systems 23 3 2010 256 266
-
(2010)
Knowledge-Based-Systems
, vol.23
, Issue.3
, pp. 256-266
-
-
Yilmaz, A.E.1
Telatar, Z.2
|