-
2
-
-
0036613083
-
An immunity-based technique to characterize intrusions in computer networks
-
DOI 10.1109/TEVC.2002.1011541, PII S1089778X02060666
-
Fabio A. Gonzalez and Dipankar Dasgupta (2002) An Immunity-based Technique to Characterize Intrusions in Computer Network, IEEE Transactions on Evolutionary Computation, Vol. 6(3), pp. 281-291. (Pubitemid 34867250)
-
(2002)
IEEE Transactions on Evolutionary Computation
, vol.6
, Issue.3
, pp. 281-291
-
-
Dasgupta, D.1
Gonzalez, F.2
-
3
-
-
0037781389
-
An immunogenetic technique to detect anomalies in network traffic proceedings of the genetic and evolutionary computation conference
-
Morgan Kaufman
-
Fabio A. Gonzalez and Dipankar Dasgupta, (2002) An Immunogenetic Technique to Detect Anomalies in Network Traffic Proceedings of the Genetic and Evolutionary Computation Conference, GECCO, Morgan Kaufman, pp. 1081-1088.
-
(2002)
GECCO
, pp. 1081-1088
-
-
Gonzalez, F.A.1
Dasgupta, D.2
-
4
-
-
0037002475
-
Intrusion detection: A brief history and overview
-
R. A. Kemmerer and G. Vigna (2002) Intrusion Detection: A Brief History and Overview, IEEE Computer, Vol. 1(1), pp. 27-30.
-
(2002)
IEEE Computer
, vol.1
, Issue.1
, pp. 27-30
-
-
Kemmerer, R.A.1
Vigna, G.2
-
6
-
-
77957914118
-
A cooperative immunological approach for detecting network anomaly
-
Elsevier
-
Tarek S. Sobh and Wael M. Mostafa (2011) A cooperative immunological approach for detecting network anomaly", Applied Soft Computing, Elsevier, Vol. 11(1), pp. 1275-1283.
-
(2011)
Applied Soft Computing
, vol.11
, Issue.1
, pp. 1275-1283
-
-
Sobh, T.S.1
Mostafa, W.M.2
-
7
-
-
57849130705
-
Anomaly-based network intrusion detection: Techniques, systems and challenges
-
Elsevier
-
P. Garcia Teodorro, J. Diaz-Verdejo, G. Marcia-Fernandez, E. Vazquez (2009) Anomaly-based network intrusion detection: Techniques, systems and challenges, Computers and Security, Elsevier, Vol. 28(1-2), pp. 18-28.
-
(2009)
Computers and Security
, vol.28
, Issue.1-2
, pp. 18-28
-
-
Garcia Teodorro, P.1
Diaz-Verdejo, J.2
Marcia-Fernandez, G.3
Vazquez, E.4
-
9
-
-
70350134739
-
The use of computational intelligence in intrusion detection systems: A review
-
S. X. Wu and W. Banzhaf (2010) The use of computational intelligence in intrusion detection systems: A review, Applied Soft Computing, Vol. 10, pp. 1-35.
-
(2010)
Applied Soft Computing
, vol.10
, pp. 1-35
-
-
Wu, S.X.1
Banzhaf, W.2
-
10
-
-
0009902369
-
-
Springer, Book Chapter, 1st Edition.
-
L. N. De Castro and J. Timmi (2002) Artificial Immune Systems: a new computational intelligence approach, Springer, Book Chapter, 1st Edition., XVIII, 380 p.
-
(2002)
Artificial Immune Systems: A New Computational Intelligence Approach
, vol.18
, pp. 380
-
-
De Castro, L.N.1
Timmi, J.2
-
11
-
-
33846309260
-
Advances in artificial immune systems
-
Dipanker Dasgupta (2006) Advances in Artificial Immune Systems, IEEE Computational Intelligence Magazine, Vol. 1(4), pp. 40-49.
-
(2006)
IEEE Computational Intelligence Magazine
, vol.1
, Issue.4
, pp. 40-49
-
-
Dasgupta, D.1
-
13
-
-
80053146546
-
Artificial immune systems
-
Springer, Springer US
-
Julie Greensmith, Amanda Whitbrook, Uwe Aickelin (2010) Artificial Immune Systems, Handbook of Metaheuristics, International Series in Operations Research and Management Science, Springer, Springer US, Vol. 146, pp. 421-448.
-
(2010)
Handbook of Metaheuristics, International Series in Operations Research and Management Science
, vol.146
, pp. 421-448
-
-
Greensmith, J.1
Whitbrook, A.2
Aickelin, U.3
-
14
-
-
78751618182
-
Recent advances in artificial immune systems
-
Dipankar Dasgupta, Senhua Yu, Fernando Nino (2011) Recent Advances in Artificial Immune Systems: Models and Applications, Applied Soft Computing, Vol. 11(2), pp. 1574-1587.
-
(2011)
Models and Applications, Applied Soft Computing
, vol.11
, Issue.2
, pp. 1574-1587
-
-
Dasgupta, D.1
Yu, S.2
Nino, F.3
-
15
-
-
67650519046
-
Two FCA-based methods for mining gen expression data
-
Mehdi Kaytoue, Sébastien Duplessis, Sergei O. Kuznetsov and Amedeo Napoli (2009) Two FCA-Based Methods for Mining Gen Expression Data", Lecture Notes in Computer Science, Vol. 5548, pp. 251-266.
-
(2009)
Lecture Notes in Computer Science
, vol.5548
, pp. 251-266
-
-
Kaytoue, M.1
Duplessis, S.2
Kuznetsov, S.O.3
Napoli, A.4
-
17
-
-
4344588856
-
Detecting new forms of network intrusion using genetic programming
-
Wei Li and Issa Traore (2004) Detecting New Forms of Network Intrusion Using Genetic Programming", Computational Intelligence, Vol. 20(3), pp. 475-494.
-
(2004)
Computational Intelligence
, vol.20
, Issue.3
, pp. 475-494
-
-
Li, W.1
Traore, I.2
-
20
-
-
84871887920
-
-
McFadden, MBI 640 Data Communications & Network Security, Northern Kentucky University
-
McFadden (2008) Genetic Algorithms and Network Intrusion Detection", MBI 640 Data Communications & Network Security, Northern Kentucky University.
-
(2008)
Genetic Algorithms and Network Intrusion Detection"
-
-
-
21
-
-
84871859918
-
An intelligent intrusion detection system using genetic algorithms and feature selection
-
Hossein M. Shirazi and Kalaji Y (2010) An Intelligent Intrusion Detection System Using Genetic Algorithms and Feature Selection", Majlesi Journal of Electrical Engineering, Vol. 4, No. 1, pp. 33-37.
-
(2010)
Majlesi Journal of Electrical Engineering
, vol.4
, Issue.1
, pp. 33-37
-
-
Shirazi, H.M.1
Kalaji, Y.2
-
22
-
-
79952226834
-
Hybrid neural network intrusion detection system using genetic algorithm, multimedia technology (ICMT)
-
Fan Li (2010) Hybrid Neural Network Intrusion Detection System Using Genetic Algorithm, Multimedia Technology (ICMT), International Conference, pp. 1-4.
-
(2010)
International Conference
, pp. 1-4
-
-
Li, F.1
-
23
-
-
84871879955
-
Rule based network intrusion detection using genetic algorithm
-
Published by Foundation of Computer Science
-
Sadiq Ali M Khan. (2011) Rule based Network Intrusion Detection using Genetic Algorithm, International Journal of Computer Applications, Vol. 18, Np. 8, pp. 26-29, Published by Foundation of Computer Science.
-
(2011)
International Journal of Computer Applications
, vol.18
, Issue.8
, pp. 26-29
-
-
Khan, S.A.M.1
-
24
-
-
84871900133
-
An implementation of intrusion detection system using genetic algorithm
-
Mohammad Sazzadul Hoque, Md. Abdul Mukit, Md. Abu Naser Bikas (2012) An Implementation of Intrusion Detection System using Genetic Algorithm, International Journal of Network Security & Its Applications, Vol. 4, No. 2, pp. 109-120.
-
(2012)
International Journal of Network Security & its Applications
, vol.4
, Issue.2
, pp. 109-120
-
-
Hoque, M.S.1
Abdul Mukit, Md.2
Abu Naser Bikas, Md.3
-
25
-
-
84871890517
-
Fitness function for genetic algorithm used in intrusion detection system
-
Alabsi, F. and Naoum, R. (2012) Fitness Function for Genetic Algorithm used in Intrusion Detection System". International Journal of Applied Science and Technology, Vol. 2, No. 4, pp. 129-134.
-
(2012)
International Journal of Applied Science and Technology
, vol.2
, Issue.4
, pp. 129-134
-
-
Alabsi, F.1
Naoum, R.2
-
27
-
-
51749123351
-
Survey: Using genetic algorithm approach in intrusion detection systems techniques
-
Owais, Suhail, Vaclav Snasel, Pavel Kromer, and Ajith Abraham (2008) Survey: using genetic algorithm approach in intrusion detection systems techniques, In IEEE Computer Information Systems and Industrial Management Applications, CISIM'08. 7th, pp. 300-307.
-
(2008)
IEEE Computer Information Systems and Industrial Management Applications, CISIM'08. 7th
, pp. 300-307
-
-
Owais, S.1
Snasel, V.2
Kromer, P.3
Abraham, A.4
-
28
-
-
84872528482
-
Detectors generation using genetic algorithm for a negative selection inspired anomaly network intrusion detection system
-
Wroclaw, Poland, ISBN 978-83-60810-51-4
-
Amira Sayed A. Aziz, Mostafa Salama, Aboul Ella Hassanien, Sanaa EL-Ola Hanafi (2012) Detectors Generation using Genetic Algorithm for a Negative Selection Inspired Anomaly Network Intrusion Detection System", In proceeding of: IEEE Fed CSIS, At Wroclaw, Poland, pp. 625-631, ISBN 978-83-60810-51-4.
-
(2012)
Proceeding Of: IEEE Fed CSIS
, pp. 625-631
-
-
Aziz, A.S.A.1
Salama, M.2
Ella Hassanien, A.3
El-Ola Hanafi, S.4
-
29
-
-
53349090793
-
The crowding approach to niching in genetic algorithms
-
MIT Press Cambridge
-
Ole Mengshoel and David E. Goldberg (2008) The Crowding Approach to Niching in Genetic Algorithms, Evolutionary Computation, MIT Press Cambridge, Vol. 16(3), pp. 315-354.
-
(2008)
Evolutionary Computation
, vol.16
, Issue.3
, pp. 315-354
-
-
Mengshoel, O.1
Goldberg, D.E.2
-
32
-
-
84871898161
-
-
NSL-KDD data set, http://nsl.cs.unb.ca/NSL-KDD
-
-
-
-
33
-
-
77950575061
-
A detailed analysis of the KDD CUP 99 data set
-
CISDA
-
M. Tavallaee, E. Bagheri, W. Lu, A. A. Ghorbani (2009) A detailed analysis of the KDD CUP 99 data set, IEEE Symposium on Computational Intelligence for Security and Defense Applications, CISDA, pp. 1-6.
-
(2009)
IEEE Symposium on Computational Intelligence for Security and Defense Applications
, pp. 1-6
-
-
Tavallaee, M.1
Bagheri, E.2
Lu, W.3
Ghorbani, A.A.4
|