Databases Reference
In-Depth Information
30. M. M. Pillai, J. H. Eloff, and H. S. Venter. An approach to implement a
network intrusion detection system using genetic algorithms. In Proceedings
of the 2004 annual research conference of the South African institute
of computer scientists and information technologists on IT research in
developing countries , Vol. 75, pp. 221-221, Stellenbosch, Western Cape, South
Africa, (2004).
31. R. H. Gong, M. Zulkernine, and P. Abolmaesumi. A software implementation
of a genetic algorithm based approach to network intrusion detection.
In The 6th International Conference on Software Engineering, Artificial
Intelligence, Networking and Parallel/Distributed Computing, 2005 and the
First ACIS International Workshop on Self-Assembling Wireless Networks
(SNPD/SAWN '05) , pp. 246-253. IEEE Press, Piscataway, NJ, USA,
(2005).
32. M. Mischiatti and F. Neri. Applying local search and genetic evolution in
concept learning systems to detect intrusion in computer networks. In eds.
R. L. de Mantaras and E. Plaza. Proceedings of the 11th European Conference
on Machine Learning (ECML '00), Barcelona, Spain, 31 May-2 June, 2000 ,
Vol. LNCS 1810/2000. Springer, Berlin/Heidelberg, Germany, (2000).
33. F. Neri. Mining TCP/IP trac for network intrusion detection by using
a distributed genetic algorithm. In eds. R. L. de Mantaras and E. Plaza.
Proceedings of the 11th European Conference on Machine Learning (ECML
'00), Barcelona, Spain, 31 May-2 June, 2000 , Vol. LNCS 1810/2000,
pp. 313-322. Springer, Berlin/Heidelberg, Germany, (2000).
34. J. Horn and D. E. Goldberg. Natural niching for evolving cooperative
classifiers.Ineds.J.R.Koza,D.E.Goldberg,D.B.Fogel,andR.L.Riolo.
Proceedings of the 1st Annual Conference on Genetic Programming ,
pp. 553-564. The MIT Press, Cambridge, MA, USA, (1996).
35. J. Holland and J. Reitman. Cognitive systems based on adaptive algorithms.
In eds. D. Waterman and F. Hayes-Roth. Pattern-Directed Inference Systems .
Academic Press, New York, NJ, USA, (1978).
36. S. Smith. A learning system based on genetic adaptive algorithms. PhD
thesis, Department of Computer Science, University of Pittsburgh, USA,
(1980).
37. C.-H. Tsang, S. Kwong, and H. Wang. Anomaly intrusion detection
using multi-objective genetic fuzzy system and agent-based evolutionary
computation framework. In Proceedings of the 5th IEEE International
Conference on Data Mining (ICDM '05) , pp. 4-7. IEEE Press, Piscataway,
NJ, USA, (2005).
38. C.-H. Tsang, S. Kwong, and H. Wang. Genetic-fuzzy rule mining approach
and evaluation of feature selection techniques for anomaly intrusion detection,
Pattern Recognition . 40 (9), 2373-2391, (2007).
39. Y. Chen, J. Zhou, and A. Abraham. Estimation of distribution algorithm
for optimization of neural networks for intrusion detection system. In
eds. L. Rutkowski, R. Tadeusiewicz, L. A. Zadeh, and J. Zurada. The
8th International Conference on Artificial Intelligence and Soft Computing
Search WWH ::




Custom Search