注册
/
登录
高级搜索
开启搜索历史记录
删除搜索历史记录.
搜索历史记录选项已关闭,请开启搜索历史记录选项。
我的图书馆
Your browser does not support JavaScript, or it is disabled. JavaScript must be enabled in order to view listings.
A SOM+ Diagnostic System for Network Intrusion Detection
作者: Chester Louis Langin
DOI:
关键词:
摘要:
保存
引用
反馈
分享
想要
索引来源
1
下载资源
1
siu.edu
本地加速
siu.edu
PDF
下载加速
参考文章
(71)
1.
Chet Langin, Michael Wainer, Shahram Rahimi, Dunren Che,
SOM with Vulture Fest Model Discovers Feral Malware and Visually Profiles the Security of Subnets.
Int. J. Comput. Their Appl..
,vol. 17, pp. 241- 249 ,(2010)
2.
Chaker Katar,
Combining Multiple Techniques for Intrusion Detection
,(2006)
3.
Paul Helman, Wynette Richards, Gunar E. Liepins,
Foundations of Intrusion Detection.
ieee computer security foundations symposium.
pp. 114- 120 ,(1992)
4.
Andrew H. Sung, Srinivas Mukkamala,
Identifying Significant Features for Network Forensic Analysis Using Artificial Intelligence Techniques.
International Journal of Digital Evidence.
,vol. 1, ,(2003)
5.
Emergence : contemporary readings in philosophy and science
MIT Press.
,(2008) ,
10.7551/MITPRESS/9780262026215.001.0001
6.
Edward G. Amoroso,
Intrusion detection : an introduction to Internet surveillance, correlation, traps, trace back, and response
,(1999)
7.
L. Wetmore, A.N. Zincir-Heywood, M.I. Heywood,
Training the SOFM efficiently: an example from intrusion detection
international joint conference on neural network.
,vol. 3, pp. 1575- 1580 ,(2005) ,
10.1109/IJCNN.2005.1556113
8.
Handbook of Human Immunology
CRC Press.
,(2008) ,
10.1201/9781420003710
9.
Mansour Esmaili, Reihaneh Safavi-Naini, Josef Pieprzyk,
Evidential reasoning in network intrusion detection systems
australasian conference on information security and privacy.
pp. 253- 265 ,(1996) ,
10.1007/BFB0023304
10.
W. Chimphlee, A.H. Abdullah, M. Noor Md Sap, S. Chimphlee, S. Srinoy,
Integrating Genetic Algorithms and Fuzzy c-Means for Anomaly Detection
ieee india conference.
pp. 575- 579 ,(2005) ,
10.1109/INDCON.2005.1590237
来源期刊
2011 年,
Volume: , Issue: ,
Page:
相似文章
2
Network Intrusion Detection Types and Computation
,2012
,
引用:
4
Network Intrusion Detection Types and Analysis of their Tools
,2012
,
引用:
2
我的图书馆
我的账户
注册
登录
Copyright 2023 ©KipHub.
高级搜索
查找文章
包含所有这些词
包含完全匹配的短语
包含至少一个这些词
不包含这些词
词语出现的位置
任意位置
标题中
显示以下作者所著的文章:
例如:
丁肇中
或
"PJ Hayes"
显示以下刊物上的文章:
例如:
《学术探索》
或
《Nature》
显示在此期间发表的文章:
—
例如:
1996
百变星君
加载中...