-
2
-
-
27844484884
-
Intrusion detection: A survey
-
Springer
-
Lazarevic, A., Kumar, V., Srivastava, J.: Intrusion detection: a survey. In: Managing Cyber Threats: Issues, Approaches, and Challenges, p. 330. Springer (2005)
-
(2005)
Managing Cyber Threats: Issues, Approaches, and Challenges
, pp. 330
-
-
Lazarevic, A.1
Kumar, V.2
Srivastava, J.3
-
3
-
-
57849130705
-
Anomaly-based network intrusion detection; technique, systems and challenges
-
Garcia-Teodoroa, P., Diaz-Verdejoa, J., Macia-Fernandez, G., Vazquez, E.: Anomaly-based network intrusion detection; technique, systems and challenges. Compuers and Security 28, 18-28 (2009)
-
(2009)
Compuers and Security
, vol.28
, pp. 18-28
-
-
Garcia-Teodoroa, P.1
Diaz-Verdejoa, J.2
Macia-Fernandez, G.3
Vazquez, E.4
-
5
-
-
34547576241
-
Feature Selection Using Rough Set in Intrusion Detection
-
Zainal, A., Maarof, M.A., Shamsuddin, S.M.: Feature Selection Using Rough Set in Intrusion Detection. In: IEEE TENCON 2006, Hongkong, November 14-17 (2006)
-
IEEE TENCON 2006, Hongkong, November 14-17 (2006)
-
-
Zainal, A.1
Maarof, M.A.2
Shamsuddin, S.M.3
-
6
-
-
38049026782
-
Feature Selection Using Rough-DPSO in Anomaly Intrusion Detection
-
Gervasi, O., Gavrilova, M.L. (eds.) ICCSA 2007, Part I. Springer, Heidelberg
-
Zainal, A., Maarof, M.A., Shamsuddin, S.M.: Feature Selection Using Rough-DPSO in Anomaly Intrusion Detection. In: Gervasi, O., Gavrilova, M.L. (eds.) ICCSA 2007, Part I. LNCS, vol. 4705, pp. 512-524. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4705
, pp. 512-524
-
-
Zainal, A.1
Maarof, M.A.2
Shamsuddin, S.M.3
-
7
-
-
77955374849
-
Network Intrusion Detection Analysis with Neural Network and Particle Swarm Optimization Algorithm
-
Tian, W., Liu, J.: Network Intrusion Detection Analysis with Neural Network and Particle Swarm Optimization Algorithm. In: 2010 Chinese IEEE Control and Decision Conference, CCDC, pp. 1749-1752 (2010)
-
(2010)
2010 Chinese IEEE Control and Decision Conference, CCDC
, pp. 1749-1752
-
-
Tian, W.1
Liu, J.2
-
8
-
-
77953182993
-
A New Intelligent Intrusion Detection Method Based on Attribute Reduction and Parameters Optimization of SVM
-
Liu, H., Jian, Y., Liu, S.: A New Intelligent Intrusion Detection Method Based on Attribute Reduction and Parameters Optimization of SVM. In: Proceedings of the Second International Workshop on Education Technology and Computer Science (ETCS), pp. 202-205 (2010)
-
(2010)
Proceedings of the Second International Workshop on Education Technology and Computer Science (ETCS)
, pp. 202-205
-
-
Liu, H.1
Jian, Y.2
Liu, S.3
-
11
-
-
79960140741
-
Wavelet Neural Networks Optimized by QPSO for Network Anomaly Detection
-
Liu, Y., Ruhui, M.A.: Wavelet Neural Networks Optimized by QPSO for Network Anomaly Detection. Journal of Computational Information Systems 7(7), 2452-2460 (2011)
-
(2011)
Journal of Computational Information Systems
, vol.7
, Issue.7
, pp. 2452-2460
-
-
Liu, Y.1
Ruhui, M.A.2
-
12
-
-
76449122009
-
Wavelet fuzzy neural network based on modified QPSO for network anomaly detection
-
Liu, Y.: Wavelet fuzzy neural network based on modified QPSO for network anomaly detection. Applied Mechanics and Materials 20-23, 1378-1384 (2010)
-
(2010)
Applied Mechanics and Materials
, vol.20-23
, pp. 1378-1384
-
-
Liu, Y.1
-
13
-
-
77649331165
-
Application of PSO-RBF neural network in network intrusion detection
-
Chen, Z., Qian, P., Chen, Z.: Application of PSO-RBF neural network in network intrusion detection. In: Proceedings of the 3rd International Symposium on Intelligent Information Technology Application, pp. 362-364 (2009)
-
(2009)
Proceedings of the 3rd International Symposium on Intelligent Information Technology Application
, pp. 362-364
-
-
Chen, Z.1
Qian, P.2
Chen, Z.3
-
14
-
-
80052687750
-
QPSO-optimized RBF Neural Network for Network Anomaly Detection
-
Liu, Y.: QPSO-optimized RBF Neural Network for Network Anomaly Detection. Journal of Information & Computational Science 8(9), 1479-1485 (2011)
-
(2011)
Journal of Information & Computational Science
, vol.8
, Issue.9
, pp. 1479-1485
-
-
Liu, Y.1
-
15
-
-
80052491926
-
Research Intrusion Detection Based PSO-RBF Classifier
-
Xu, R., Rui, A., Xiao, F.: Research Intrusion Detection Based PSO-RBF Classifier. In: Proceeding of IEEE 2nd International Conference on Software Engineering and Service Science (ICSESS), pp. 104-107 (2011)
-
(2011)
Proceeding of IEEE 2nd International Conference on Software Engineering and Service Science (ICSESS)
, pp. 104-107
-
-
Xu, R.1
Rui, A.2
Xiao, F.3
-
16
-
-
70350602937
-
Feature Selection using PSO-SVM
-
IJCS-33-1-18
-
Tu, C.-J., Li-Yeh, C., Jun, Y., Cheng, H.: Feature Selection using PSO-SVM. IAENG International Journal of Computer Science 33(1), IJCS-33-1-18 (2007)
-
(2007)
IAENG International Journal of Computer Science
, vol.33
, Issue.1
-
-
Tu, C.-J.1
Li-Yeh, C.2
Jun, Y.3
Cheng, H.4
-
17
-
-
61349162403
-
A New Intrusion Detection Method Based on BPSO-SVM
-
Ma, J., Liu, X., Liu, S.: A New Intrusion Detection Method Based on BPSO-SVM. In: Proceedings of the International Symposium on Computational Intelligence and Design, pp. 473-477 (2008a)
-
(2008)
Proceedings of the International Symposium on Computational Intelligence and Design
, pp. 473-477
-
-
Ma, J.1
Liu, X.2
Liu, S.3
-
18
-
-
79961018914
-
Quantum Particle swarm optimization based network Intrusion feature selection and Detection
-
Zhang, H., Gao, H.-H., Wang, X.Y.: Quantum Particle swarm optimization based network Intrusion feature selection and Detection. In: Proceedings of the 17th World Congress The International Federation of Automatic Control, Seoul, Korea (2008)
-
Proceedings of the 17th World Congress the International Federation of Automatic Control, Seoul, Korea (2008)
-
-
Zhang, H.1
Gao, H.-H.2
Wang, X.Y.3
-
19
-
-
70350712577
-
Research on intrusion detection of SVM based on PSO
-
Zhou, T., Li, Y., Li, J.: Research on intrusion detection of SVM based on PSO. In: Proceedings of the International Conference on Machine Learning and Cybernetics, pp. 1205-1209 (2009)
-
(2009)
Proceedings of the International Conference on Machine Learning and Cybernetics
, pp. 1205-1209
-
-
Zhou, T.1
Li, Y.2
Li, J.3
-
20
-
-
79551528921
-
A Real-time Intrusion Detection System based on PSO-SVM
-
Wang, J., Hong, X., Ren, R.-R., Li, T.-H.: A Real-time Intrusion Detection System based on PSO-SVM. In: Proceedings of the International Workshop on Information Security and Application (IWISA 2009), pp. 319-321 (2009)
-
(2009)
Proceedings of the International Workshop on Information Security and Application (IWISA 2009)
, pp. 319-321
-
-
Wang, J.1
Hong, X.2
Ren, R.-R.3
Li, T.-H.4
-
21
-
-
33750331605
-
Feature Selection and Classification Using Hybrid Flexible Neural Tree
-
Chen, Y., Abraham, A., Yang, J.: Feature Selection and Classification Using Hybrid Flexible Neural Tree. Journal of Neuro Computing 7, 305-313 (2006)
-
(2006)
Journal of Neuro Computing
, vol.7
, pp. 305-313
-
-
Chen, Y.1
Abraham, A.2
Yang, J.3
-
22
-
-
68049106273
-
Evolutionary Flexible Neural Networks for Intrusion Detection System
-
Chen, Y., Zhang, L.: Evolutionary Flexible Neural Networks for Intrusion Detection System. In: Proceedings of the 5th WSEAS International Conference on Applied Computer Science, Hangzhou, China, pp. 428-433 (2006)
-
(2006)
Proceedings of the 5th WSEAS International Conference on Applied Computer Science, Hangzhou, China
, pp. 428-433
-
-
Chen, Y.1
Zhang, L.2
-
23
-
-
57849092307
-
-
IEEE Computer Society, Washington, DC
-
Michailidis, E.: Proceedings of the 2008 Panhellenic Conference on Informatics, PCI 2008, pp. 8-12. IEEE Computer Society, Washington, DC (2008)
-
(2008)
Proceedings of the 2008 Panhellenic Conference on Informatics, PCI 2008
, pp. 8-12
-
-
Michailidis, E.1
-
24
-
-
80052929791
-
Feature Selection Method for Network Intrusion Based on GQPSO Attribute Reduction
-
Gong, S.F., Gong, X., Bi, X.: Feature Selection Method for Network Intrusion Based on GQPSO Attribute Reduction. In: 2011 International Conference on Multimedia Technology (ICMT), pp. 6365-6368 (2011)
-
(2011)
2011 International Conference on Multimedia Technology (ICMT)
, pp. 6365-6368
-
-
Gong, S.F.1
Gong, X.2
Bi, X.3
|