Databases Reference
In-Depth Information
(ICAISC '06) , Vol. LNCS 4029/2006, pp. 9-18. Springer, Berlin/Heidelberg,
Germany, (2006).
40. M. S. Abadeh and J. Habibi. Computer intrusion detection using an iterative
fuzzy rule learning approach. In IEEE International Conference on Fuzzy
Systems (FUZZ-IEEE '07) , pp. 1-6, London, UK, (2007). IEEE Press,
Piscataway, NJ, USA.
41. T. Ozyer, R. Alhajj, and K. Barker. Intrusion detection by integrating
boosting genetic fuzzy classifier and data mining criteria for rule pre-
screening, Journal of Network and Computer Applications . 30 (1), 99-113,
(2007).
42. D. Wilson and D. Kaur. Using grammatical evolution for evolving intrusion
detection rules. In ed. G. R. Dattatreya. Proceedings of the 5th WSEAS Int.
Conf. on Circuits, Systems, Electronics, Control & Signal Processing , pp.
42-47, Dallas, TX, USA, (2006).
43. Z. Bankovic, D. Stepanovic, S. Bojanica, and O. Nieto-Taladriz. Improving
network security using genetic algorithm approach, Computers & Electrical
Engineering . 33 (5-6), 438-451, (2007).
44. H. H. Dam, K. Shafi, and H. A. Abbass. Can evolutionary computation
handle large dataset? In eds. S. Zhang and R. Jarvis. AI 2005: Advances
in Artificial Intelligence- 18th Australian Joint Conference on Artificial
Intelligence, Sydney, Australia, 5-9 December, 2005 , Vol. LNCS 3809/2005,
pp. 1092-1095. Springer, Berlin/Heidelberg, Germany, (2005).
45. K. Shafi, H.A.Abbass, and W. Zhu. An adaptive rule-based intrusion
detection architecture. In The Security Technology Conference, the 5th
Homeland Security Summit , pp. 345-355, Canberra, Australia, (2006).
46. K. Shafi, Kamran, H. A. Abbass, and W. Zhu. The role of early stopping
and population size in XCS for intrusion detection. In eds. T.-D. Wang and
et al. , Simulated Evolution and Learning , Vol. LNCS 4247/2006, pp. 50-57.
Springer, Berlin/Heidelberg, Germany, (2006).
47. K. Shafi, H. Abbass, and W. Zhu. Real time signature extraction during
adaptive rule discovery using UCS. In eds. D. Srinivasan and L. Wang.
Proceedings of the IEEE Congress on Evolutionary Computation (ICEC '07) ,
pp. 2509-2516, Singapore, (2007). IEEE Press, Piscataway, NJ, USA.
48. K. Shafi, T. Kovacs, H. A. Abbass, and W. Zhu. Intrusion detection with
evolutionary learning classifier systems, Natural Computing . (2007).
49. M. Crosbie and E. H. Spafford. Applying genetic programming to intrusion
detection. In eds. E. V. Siegel and J. R. Koza. Working Notes for the AAAI
Symposium on Genetic Programming , pp. 1-8, MIT, Cambridge, MA, USA,
(1995). AAAI Press, Menlo Park, CA, USA.
50. W. Lu and I. Traore. Detecting new forms of network intrusion using genetic
programming, Computational Intelligence . 20 (3), 475-494, (2004).
51. C. Yin, S. Tian, H. Huang, and J. He. Applying genetic programming to
evolve learned rules for network anomaly detection. In eds. L. Wang, K. Chen
and Y. S. Ong. Advances in Natural Computation , Vol. LNCS 3612/2005, pp.
323-331. Springer, Berlin/Heidelberg, Germany, (2005).
Search WWH ::




Custom Search