Information Technology Reference
In-Depth Information
Naoum, R. S., Abid, N. A., Al-Sultani, Z. N. (2005) An enhanced Resilient backpropagation
arti cial neural network for Intrusion detection , International Journal of Computer Science
and Network Security, 2005, 12(3), 11 - 16.
Pan Z., Chen, S., Hu, G., & Zhang, D. (2003). Hybrid neural network and C4.5 for misuse
detection. In Proceedings of the second international conference on machine learning and
cybernetics (Vol. 4, pp. 2463
2467). IEEE.
-
Pel
á
a, J.M., Fornari, J. F., &Serra, G. (2014). Ischemia classification via ECGusingMLP
neural networks. International Journal of Computational Intelligence Systems, 7(2), 344
ez, J. I., Do
ñ
352.
Peng, Y., Wang, Y., Niu, Y., & Hu, Q. (2014). Application study on intrusion detection system
using IRBF. Journal of Software, 9(1), 177
-
183.
Saftoiu, A., Vilmann, P., Gorunescu, F., Janssen, J., Hocke, M., & Larsen, M., et al. (2012).
Ef cacy of an arti cial neural network-based approach to endoscopic ultrasound elastography
in diagnosis of focal pancreatic masses. Clinical Gastroenterology Hepatology, 10(1), 84
-
90.
Sall, J., Creighton, L., & Lehman, A. (2007). Safari tech topics online. JMP start statistics a guide
to statistics and data analysis using JMP. SAS press series (4th edn.). Cary, N.C.: SAS Pub.
Segurado, P., & Araujo, M. B. (2004). An evaluation of methods for modelling species
distributions. Journal of Biogeography, 31(10), 1555 - 1568.
Shao, G., & Halpin, P. N. (1995). Climatic controls of eastern North American coastal tree and
shrub distributions. Journal of Biogeography, 1083 - 1089.
Sheikhan, M., & Sharifi, Rad, M. (2011). Intrusion detection improvement using GA-optimized
fuzzy grids-based rule mining feature selector and fuzzy ARTMAP neural network. World
Applied Sciences Journal, 14, 772 - 781.
Sheikhan, M., & Sharifi, Rad M. (2013). Using particle swarm optimization in fuzzy association
rules-based feature selection and fuzzy ARTMAP-based attack recognition. Security and
Communication Networks, 6(7), 797
-
811.
Sivatha Sindhu, S. S., Geetha, S., & Kannan, A. (2012). Decision tree based light weight intrusion
detection using a wrapper approach. Expert Systems with applications, 39(1), 129
-
141.
Stolfo, S. J., Fan, W., Lee, W., Prodromidis, A., &Chan, P. K. (2000). Cost-based modeling for fraud
and intrusion detection: Results from the JAMproject. In Proceedings of the DARPA information
survivability conference and exposition, 2000 (DISCEX
-
'
00) (Vol. 2, pp. 130
144). IEEE.
-
Swets, J. A.
(1988). Measuring the accuracy of diagnostic systems. Science, 240(4857),
1293.
Tiwari, P. (2002). Intrusion detection. Technical Report, Department of Electrical Engineering,
Indian Institute of Technology, Delhi.
Tuncer, T., & Tatar, Y. (2012). Implementation of the FPGA based programmable embedded
intrusion detection system. Journal of the Faculty of Engineering and Architecture of Gazi
University, 27(1), 59 - 69.
Valero, S., Senabre, C., L ó pez, M., Aparicio, J., Gabaldon, A., & Ortiz, M. (2012). Comparison of
electric load forecasting between using SOM and MLP neural network. Journal of Energy and
Power Engineering, 6(3), 411
1285
-
417.
Wang, G., Hao, J., Ma, J., & Huang, L. (2010). A new approach to intrusion detection using
artificial neural networks and fuzzy clustering. Expert Systems with Applications, 37(9),
6225
-
6232.
Wang, J. H., Liao, Y. L., Tsai, T. M., & Hung, G. (2006). Technology-based financial frauds in
Taiwan: Issues and approaches. In SMC (pp. 1120
-
1124).
Wu, S. X., & Banzhaf, W. (2010). The use of computational intelligence in intrusion detection
systems: A review. Applied Soft Computing, 10(1), 1
-
35.
Xiang, Z., Zhu, J., Han, W., & Ding, J. (2013). On the capability of SOINN based intrusion
detection systems. Journal of Computational Information Systems, 9(3), 941
-
949.
Yang, S., Yang, Y., Shen, Q., & Huang, H. (2013). A method of intrusion detection based on
semi-supervised GHSOM. In Jisuanji Yanjiu yu Fazhan/Computer Research and Develop-
ment. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, November 2013 (Vol.
50(11), pp. 2375 - 2382).
-
Search WWH ::




Custom Search