참고문헌
- Breunig, M., H.-P. Kriegel, R. T. Ng, J. Sander, "LO F : identifying density-based local outliers", Proceedings of the ACM SIGMOD International Conference on Management of Data, Vol.29, No.2(2000), 93-104. https://doi.org/10.1145/335191.335388
- Chavan, S., K. Shah, N. Dave, S. Mukherjee, A. Abraham, "Adaptive neuro-fuzzy intrusion detection systems", Information Technology : Coding and Computing, Vol.1(2004), 70-74.
- Denning, D. E., "An intrusion-detection model", IEEE Transactions on Software Engineering, Vol.SE-13, No.2(2004), 222-232.
- A.K. Ghosh, A. Schwartzbard, "A Study in Using Neural Networks for Anomaly and Misuse Detection", Proceedings of the 7th USENIX Security Symposium, 1998.
- Han, H., X. L. Lu, J Lu, C. Bo, R. L. Yong, "Data mining aided signature discovery in network-based intrusion detection system", ACM SIGOPS Operating Systems Review, Vol.36, No.4(2002), 7-13. https://doi.org/10.1145/583800.583801
- Kanungo, T., D. Mount, N. Netanyahu, C. Piatko, R. Silverman, and A. Wu., "An efficient K-means clustering algorithm : analysis and implementation", In IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 24, No.7(2002), 881-892. https://doi.org/10.1109/TPAMI.2002.1017616
- Kruegel, C., D. Mutz, W. Robertson, F. Valeur, (2003), "Bayesian event classification for intrusion detection", Proceedings of the 19th Annual Computer Security Applications Conference, (2003), 14-23.
- Lazarevic, A., L. Ertoz, V. Kumar, A. Ozgur, "A comparative study of anomaly detection schemes in network intrusion detection", Proceedings of the Third SIAM International Conference, (2004), 25-36.
- Lee, W., S. J. Stolfo, K. W. Mok, "A data mining framework for building intrusion detection models", IEEE Symposium on Security and Privacy, (1999), 120-132.
- Lee, W., S. J. Stolfo, P. K. Chan, E. Eskin, W. Fan, "Real time data mining-based intrusion detection", DARPA Information Survivability Conference (2001).
- Lichodzijewski, P., A. Zincir-Heywood, and M. Heywood., "Dynamic intrusion detection using self-organizing maps", The 14th Annual Canadian Information Technology Security, 2002.
- Linde, Y., A. Buzo, R. Gray, "An Algorithm for Vector Quantizer Design", IEEE Transaction on Communications, Vol.28 No.1(1980), 84-94 https://doi.org/10.1109/TCOM.1980.1094577
- Mukkamala, S., G. Janoski, A. Sung, "Intrusion detection using neural networks and support vector machines", Proceedings of IEEE International Joint Conference on Neural Networks, (2002), 1702-1707.
- Patan, G. and M. Russo., "The enhanced LBG algorithm", Neural Networks, Vol.14, No.9(2001), 1219-1237. https://doi.org/10.1016/S0893-6080(01)00104-6
- Portnoy, L., E. Eskin, S. Stolfo, "Intrusion detection with unlabeled data using clustering", Proceedings of ACM CSS Workshop on Data Mining 2001.
- Yahia, M. E., B. A. Ibrahim, "K-nearest neighbor and C4.5 algorithms as data mining methods-advantages and difficulties", Computer Systems and Applications, 2003.
- Zheng, J. and M. Hu, "An Anomaly Intrusion Detection Sys Based on Vector Quantization", IEICE-Transactions on Information and Systems archive, Vol. E89-D, No.1, (2006), 201-210. https://doi.org/10.1093/ietisy/e89-d.1.201