Hybrid network intrusion detection (withdrawal notice)

作者: David Tahmoush

DOI: 10.1117/12.2050043

关键词: Network intrusion detectionComputer securityHomeland defenseNoticeHomeland securityCode (cryptography)Computer scienceIntrusion detection system

摘要: The paper has been withdrawn from the SPIE Proce HGLQJVDWWKHDXWKRU¶VUHTXHVWSensors, and Command, Control, Communications, Intelligence (C3I) Technologies for Homeland Security Defense XIII, edited by Edward M. Carapezza, Proc. of Vol. 9074, 90740G © 2014 · CCC code: 0277-786X/14/$18 doi: 10.1117/12.2050043Proc. 9074 90740G-1

参考文章(44)
Eugene H. Spafford, Mark Crosbie, Applying Genetic Programming to Intrusion Detection ,(1995)
Raymond J. Chang, Richard E. Harang, Garrett S. Payer, Extremely Lightweight Intrusion Detection (ELIDe) Defense Technical Information Center. ,(2013) , 10.21236/ADA592893
Julia Allen, Alan Christie, William Fithen, John McHugh, Jed Pickel, State of the Practice of Intrusion Detection Technologies Defense Technical Information Center. ,(2000) , 10.21236/ADA375846
Ricardo S. Puttini, A Bayesian Classification Model for Real-Time Intrusion Detection BAYESIAN INFERENCE AND MAXIMUM ENTROPY METHODS IN SCIENCE AND ENGINEERING: 22nd International Workshop on Bayesian Inference and Maximum Entropy Methods in Science and Engineering. ,vol. 659, pp. 150- 162 ,(2003) , 10.1063/1.1570541
Nawa Ngamwitthayanon, Naruemon Wattanapongsakorn, David W. Coit, Investigation of Fuzzy Adaptive Resonance Theory in Network Anomaly Intrusion Detection international symposium on neural networks. pp. 208- 217 ,(2009) , 10.1007/978-3-642-01510-6_24
Gianluca Maiolini, Andrea Baiocchi, Alfonso Iacovazzi, Antonello Rizzi, Real Time Identification of SSH Encrypted Application Flows by Using Cluster Analysis Techniques international ifip tc networking conference. pp. 182- 194 ,(2009) , 10.1007/978-3-642-01399-7_15
J.E. Dickerson, J.A. Dickerson, Fuzzy network profiling for intrusion detection north american fuzzy information processing society. pp. 301- 306 ,(2000) , 10.1109/NAFIPS.2000.877441
Gulshan Kumar, Krishan Kumar, Monika Sachdeva, The use of artificial intelligence based techniques for intrusion detection: a review Artificial Intelligence Review. ,vol. 34, pp. 369- 387 ,(2010) , 10.1007/S10462-010-9179-5