-
1
-
-
69449101508
-
A probabilistic neural network for earthquake magnitude prediction
-
Adeli, H., Panakkat, A., A probabilistic neural network for earthquake magnitude prediction. Neural Networks 22:1 (2009), 1018–1024.
-
(2009)
Neural Networks
, vol.22
, Issue.1
, pp. 1018-1024
-
-
Adeli, H.1
Panakkat, A.2
-
3
-
-
79956097533
-
Mutual information-based feature selection for intrusion detection systems
-
Amiri, F., Yousefi, M.R., Lucas, C., Shakery, A., Yazdani, N., Mutual information-based feature selection for intrusion detection systems. Journal of Network and Computer Applications 34:4 (2011), 1184–1199.
-
(2011)
Journal of Network and Computer Applications
, vol.34
, Issue.4
, pp. 1184-1199
-
-
Amiri, F.1
Yousefi, M.R.2
Lucas, C.3
Shakery, A.4
Yazdani, N.5
-
4
-
-
53049099150
-
Critical study of neural networks in detecting intrusions
-
Beghdad, R., Critical study of neural networks in detecting intrusions. Computers & Security 27:5 (2008), 168–175.
-
(2008)
Computers & Security
, vol.27
, Issue.5
, pp. 168-175
-
-
Beghdad, R.1
-
5
-
-
33744747100
-
Graphs and hypergraphs, Vol. 7
-
North-Holland publishing company Amsterdam
-
Berge, C., Graphs and hypergraphs, Vol. 7. 1973, North-Holland publishing company, Amsterdam.
-
(1973)
-
-
Berge, C.1
-
7
-
-
0000231655
-
-
In National information systems security conference, October (pp. ).
-
Cannady, J. (1998). Artificial neural networks for misuse detection. In National information systems security conference, October (pp. 368–81).
-
(1998)
Artificial neural networks for misuse detection.
, pp. 368-81
-
-
Cannady, J.1
-
8
-
-
26444488624
-
Network-based anomaly detection using an elman network
-
Springer Berlin, Heidelberg
-
Cheng, E., Jin, H., Han, Z., Sun, J., Network-based anomaly detection using an elman network. Networking and mobile computing, 2005, Springer Berlin, Heidelberg, 471–480.
-
(2005)
Networking and mobile computing
, pp. 471-480
-
-
Cheng, E.1
Jin, H.2
Han, Z.3
Sun, J.4
-
9
-
-
85132011160
-
An application of a recurrent network to an intrusion detection system
-
IEEE June
-
Debar, H., Dorizzi, B., An application of a recurrent network to an intrusion detection system. International joint conference on neural networks, 1992, Vol. 2, IJCNN, 1992, IEEE, 478–483 June.
-
(1992)
International joint conference on neural networks, 1992, Vol. 2, IJCNN
, pp. 478-483
-
-
Debar, H.1
Dorizzi, B.2
-
10
-
-
70350122229
-
Profile-based adaptive anomaly detection for network security. Sandia National Laboratories Technical Report, SAND2005–7293
-
Durgin, N.A., Zhang, P., Profile-based adaptive anomaly detection for network security. Sandia National Laboratories Technical Report, SAND2005–7293., 2005.
-
(2005)
-
-
Durgin, N.A.1
Zhang, P.2
-
11
-
-
67649946286
-
Bayesian data analysis, Vol. 2
-
Chapman & Hall/CRC Boca Raton, FL, USA
-
Gelman, A., Carlin, J.B., Stern, H.S., Rubin, D.B., Bayesian data analysis, Vol. 2. 2014, Chapman & Hall/CRC, Boca Raton, FL, USA.
-
(2014)
-
-
Gelman, A.1
Carlin, J.B.2
Stern, H.S.3
Rubin, D.B.4
-
12
-
-
58149263390
-
A PSO-based approach to rule learning in network intrusion detection
-
Springer Berlin, Heidelberg
-
Guolong, C., Qingliang, C., Wenzhong, G., A PSO-based approach to rule learning in network intrusion detection. Fuzzy information and engineering, 2007, Springer Berlin, Heidelberg, 666–673.
-
(2007)
Fuzzy information and engineering
, pp. 666-673
-
-
Guolong, C.1
Qingliang, C.2
Wenzhong, G.3
-
13
-
-
33744529638
-
Evolutionary neural networks for anomaly detection based on the behavior of a program
-
Han, S.J., Cho, S.B., Evolutionary neural networks for anomaly detection based on the behavior of a program. IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics) 36:3 (2005), 559–570.
-
(2005)
IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics)
, vol.36
, Issue.3
, pp. 559-570
-
-
Han, S.J.1
Cho, S.B.2
-
14
-
-
27144507060
-
Intrusion detection in computer networks with neural and fuzzy classifiers
-
Springer Berlin, Heidelberg
-
Hofmann, A., Schmitz, C., Sick, B., Intrusion detection in computer networks with neural and fuzzy classifiers. Artificial neural networks and neural information processing—ICANN/ICONIP 2003, 2003, Springer Berlin, Heidelberg, 316–324.
-
(2003)
Artificial neural networks and neural information processing—ICANN/ICONIP 2003
, pp. 316-324
-
-
Hofmann, A.1
Schmitz, C.2
Sick, B.3
-
15
-
-
0141794734
-
RBF-based real-time hierarchical intrusion detection systems
-
IEEE
-
Jiang, J., Zhang, C., Kamel, M., RBF-based real-time hierarchical intrusion detection systems. Neural networks, 2003. Proceedings of the international joint conference on, Vol. 2, 2003, IEEE, 1512–1516.
-
(2003)
Neural networks, 2003. Proceedings of the international joint conference on
, vol.2
, pp. 1512-1516
-
-
Jiang, J.1
Zhang, C.2
Kamel, M.3
-
16
-
-
77955303956
-
Root mean square filter for noisy images based on hyper graph model
-
Kannan, K., Kanna, B.R., Aravindan, C., Root mean square filter for noisy images based on hyper graph model. Image and Vision Computing 28:9 (2010), 1329–1338.
-
(2010)
Image and Vision Computing
, vol.28
, Issue.9
, pp. 1329-1338
-
-
Kannan, K.1
Kanna, B.R.2
Aravindan, C.3
-
17
-
-
33947251166
-
A hierarchical SOM-based intrusion detection system
-
Kayacik, H.G., Zincir-Heywood, A.N., Heywood, M.I., A hierarchical SOM-based intrusion detection system. Engineering Applications of Artificial Intelligence 20:4 (2007), 439–451.
-
(2007)
Engineering Applications of Artificial Intelligence
, vol.20
, Issue.4
, pp. 439-451
-
-
Kayacik, H.G.1
Zincir-Heywood, A.N.2
Heywood, M.I.3
-
18
-
-
85020632697
-
-
KDD Cup 99 Data set (), Available online at:. (n.d.).
-
KDD Cup 99 Data set (1999), Available online at: http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html. (n.d.).
-
(1999)
-
-
-
19
-
-
33750516723
-
Adaptive anomaly detection with evolving connectionist systems
-
Liao, Y., Vemuri, V.R., Pasos, A., Adaptive anomaly detection with evolving connectionist systems. Journal of Network and Computer Applications 30:1 (2007), 60–80.
-
(2007)
Journal of Network and Computer Applications
, vol.30
, Issue.1
, pp. 60-80
-
-
Liao, Y.1
Vemuri, V.R.2
Pasos, A.3
-
20
-
-
0036079805
-
Host-based intrusion detection using self-organizing maps
-
IEEE
-
Lichodzijewski, P., Zincir-Heywood, A.N., Heywood, M.I., Host-based intrusion detection using self-organizing maps. Proceedings of the 2002 international joint conference on neural networks, 2002, Vol. 2, IJCNN’02, 2002, IEEE, 1714–1719.
-
(2002)
Proceedings of the 2002 international joint conference on neural networks, 2002, Vol. 2, IJCNN’02
, pp. 1714-1719
-
-
Lichodzijewski, P.1
Zincir-Heywood, A.N.2
Heywood, M.I.3
-
21
-
-
84933183260
-
CANN: An intrusion detection system based on combining cluster centers and nearest neighbors
-
Lin, W.C., Ke, S.W., Tsai, C.F., CANN: An intrusion detection system based on combining cluster centers and nearest neighbors. Knowledge-Based Systems 78 (2015), 13–21.
-
(2015)
Knowledge-Based Systems
, vol.78
, pp. 13-21
-
-
Lin, W.C.1
Ke, S.W.2
Tsai, C.F.3
-
22
-
-
0036082885
-
A comparison of input representations in neural networks: a case study in intrusion detection
-
IEEE
-
Liu, Z., Florez, G., Bridges, S.M., A comparison of input representations in neural networks: a case study in intrusion detection. Proceedings of the 2002 international joint conference on neural networks, 2002, Vol. 2, IJCNN’02, 2002, IEEE, 1708–1713.
-
(2002)
Proceedings of the 2002 international joint conference on neural networks, 2002, Vol. 2, IJCNN’02
, pp. 1708-1713
-
-
Liu, Z.1
Florez, G.2
Bridges, S.M.3
-
23
-
-
0036804085
-
Network intrusion and fault detection: a statistical anomaly approach
-
Manikopoulos, C., Papavassiliou, S., Network intrusion and fault detection: a statistical anomaly approach. IEEE Communications Magazine 40:10 (2002), 76–82.
-
(2002)
IEEE Communications Magazine
, vol.40
, Issue.10
, pp. 76-82
-
-
Manikopoulos, C.1
Papavassiliou, S.2
-
24
-
-
85020653378
-
Neural networks with categorical valued inputs and applications to intrusion detection
-
University of Missouri/Rolla
-
Novokhodko, A., Neural networks with categorical valued inputs and applications to intrusion detection. 2004, University of Missouri/Rolla.
-
(2004)
-
-
Novokhodko, A.1
-
25
-
-
84994275509
-
Rough set-hypergraph-based feature selection approach for intrusion detection systems
-
Raman, M.G., Kannan, K., Pal, S.K., Sriram, V.S., Rough set-hypergraph-based feature selection approach for intrusion detection systems. Defence Science Journal, 66(6), 2016, 612.
-
(2016)
Defence Science Journal
, vol.66
, Issue.6
, pp. 612
-
-
Raman, M.G.1
Kannan, K.2
Pal, S.K.3
Sriram, V.S.4
-
26
-
-
85012897941
-
Development of rough set—hypergraph technique for key feature identification in intrusion detection systems
-
Raman, M.G., Kirthivasan, K., Sriram, V.S., Development of rough set—hypergraph technique for key feature identification in intrusion detection systems. Computers & Electrical Engineering, 2017.
-
(2017)
Computers & Electrical Engineering
-
-
Raman, M.G.1
Kirthivasan, K.2
Sriram, V.S.3
-
27
-
-
84898944587
-
Intrusion detection with neural networks
-
Ryan, J., Lin, M.J., Miikkulainen, R., Intrusion detection with neural networks. Advances in Neural Information Processing Systems, 1998, 943–949.
-
(1998)
Advances in Neural Information Processing Systems
, pp. 943-949
-
-
Ryan, J.1
Lin, M.J.2
Miikkulainen, R.3
-
28
-
-
17444432965
-
Hierarchical Kohonenen net for anomaly detection in network security
-
Sarasamma, S.T., Zhu, Q.A., Huff, J., Hierarchical Kohonenen net for anomaly detection in network security. IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics) 35:2 (2005), 302–312.
-
(2005)
IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics)
, vol.35
, Issue.2
, pp. 302-312
-
-
Sarasamma, S.T.1
Zhu, Q.A.2
Huff, J.3
-
29
-
-
42449117164
-
Guide to intrusion detection and prevention systems (idps), Vol. 800
-
NIST Special Publication
-
Scarfone, K., Mell, P., Guide to intrusion detection and prevention systems (idps), Vol. 800. 2007, NIST Special Publication, 94.
-
(2007)
, pp. 94
-
-
Scarfone, K.1
Mell, P.2
-
30
-
-
67349109383
-
A novel feature selection technique for number classification problem using PNN—A plausible scheme for boiler flue gas analysis
-
Sivakumar, A., Kannan, K., A novel feature selection technique for number classification problem using PNN—A plausible scheme for boiler flue gas analysis. Sensors and Actuators B (Chemical) 139:2 (2009), 280–286.
-
(2009)
Sensors and Actuators B (Chemical)
, vol.139
, Issue.2
, pp. 280-286
-
-
Sivakumar, A.1
Kannan, K.2
-
31
-
-
84988841912
-
A computational model for ranking cloud service providers using hypergraph based techniques
-
Somu, N., Kirthivasan, K., Vs, S.S., A computational model for ranking cloud service providers using hypergraph based techniques. Future Generation Computer Systems 68 (2017), 14–30.
-
(2017)
Future Generation Computer Systems
, vol.68
, pp. 14-30
-
-
Somu, N.1
Kirthivasan, K.2
Vs, S.S.3
-
32
-
-
84988688678
-
Hypergraph based feature selection technique for medical diagnosis
-
Somu, N., Raman, M.G., Kirthivasan, K., Sriram, V.S., Hypergraph based feature selection technique for medical diagnosis. Journal of Medical Systems, 40(11), 2016, 239.
-
(2016)
Journal of Medical Systems
, vol.40
, Issue.11
, pp. 239
-
-
Somu, N.1
Raman, M.G.2
Kirthivasan, K.3
Sriram, V.S.4
-
33
-
-
0024123401
-
-
In IEEE international conference on neural networks, Vol., No., July, (pp. ).
-
Specht, D.F. (1988). Probabilistic neural networks for classification, mapping, or associative memory. In IEEE international conference on neural networks, Vol. 1, No. 24, July, (pp. 525–532).
-
(1988)
Probabilistic neural networks for classification, mapping, or associative memory.
, vol.1
, Issue.24
, pp. 525-532
-
-
Specht, D.F.1
-
34
-
-
0025399335
-
Probabilistic neural networks and the polynomial adaline as complementary techniques for classification
-
Specht, D.F., Probabilistic neural networks and the polynomial adaline as complementary techniques for classification. IEEE Transactions on Neural Networks 1:1 (1990), 111–121.
-
(1990)
IEEE Transactions on Neural Networks
, vol.1
, Issue.1
, pp. 111-121
-
-
Specht, D.F.1
-
35
-
-
0029531733
-
The application of neural networks to UNIX computer security
-
IEEE November
-
Tan, K., The application of neural networks to UNIX computer security. IEEE international conference on neural networks, 1995. Proceedings., Vol. 1, 1995, IEEE, 476–481 November.
-
(1995)
IEEE international conference on neural networks, 1995. Proceedings., Vol. 1
, pp. 476-481
-
-
Tan, K.1
-
36
-
-
0004004577
-
Advanced methods in neural computing
-
John Wiley & Sons, Inc.
-
Wasserman, P.D., Advanced methods in neural computing. 1993, John Wiley & Sons, Inc.
-
(1993)
-
-
Wasserman, P.D.1
-
37
-
-
85009962818
-
Data Mining: Practical machine learning tools and techniques
-
Morgan Kaufmann
-
Witten, I.H., Frank, E., Hall, M.A., Pal, C.J., Data Mining: Practical machine learning tools and techniques. 2016, Morgan Kaufmann.
-
(2016)
-
-
Witten, I.H.1
Frank, E.2
Hall, M.A.3
Pal, C.J.4
-
38
-
-
70350134739
-
The use of computational intelligence in intrusion detection systems: A review
-
Wu, S.X., Banzhaf, W., The use of computational intelligence in intrusion detection systems: A review. Applied Soft Computing 10:1 (2010), 1–35.
-
(2010)
Applied Soft Computing
, vol.10
, Issue.1
, pp. 1-35
-
-
Wu, S.X.1
Banzhaf, W.2
-
39
-
-
58349096877
-
Data mining-based intrusion detectors
-
Wu, S.Y., Yen, E., Data mining-based intrusion detectors. Expert Systems with Applications 36:3 (2009), 5605–5612.
-
(2009)
Expert Systems with Applications
, vol.36
, Issue.3
, pp. 5605-5612
-
-
Wu, S.Y.1
Yen, E.2
|