1 |
S. Y. Lee, Y. S. Kim, and B. H. Lee, "A Probe Detection Model using the Analysis of the Fuzzy Cognitive Maps," International Conference Cyber and Security, Vol. 3480, 2005, pp. 320-328.
|
2 |
M. Jazzar, and A. Jantan, "Towards real-time intrusion detection using fuzzy cognitive maps modeling and simulation," International Symposium on Information Technology, Vol. 2, 2008, pp. 1-6.
|
3 |
이세열, "자가적응모듈과 퍼지인식도가 적용된 하이브리드 침입시도탐지모델," 디지털산업정보학회논문지, 제13권, 제3호, 2017, pp. 19-25.
DOI
|
4 |
J. Moon, and Y. Chang, "A Malware Detection Application Framework Based on Normal Behavior," The Journal of the Convergence on Culture, Vol. 2, No. 1, Feb 2016, pp. 79-85.
DOI
|
5 |
양환석, "프로토콜 기반 분산 침입탐지시스템 설 계 및 구현," 디지털산업정보학회논문지, 제8권, 제1호, 2012, pp. 81-87.
|