1 |
James A. Freeman and David M. Skapura, 'Neural Networks : Algorithms, Applications and Programming Techniques,' pp.89-123, Addison Wesley, 1992
|
2 |
Martin T. Hagan, Howard B. Demuth, MA가 Beale, 'Neural Network Design,' PWS publishing Company, 1996
|
3 |
Susan M. Bridges, Rayford B. Vaughn, 'INTRUSION DETECTION VIA FUZZY DATA MINING,' Accepted for Presentation at The Twelfth Annual Canadian Information Technology Security Symposium pp.19-23, June, 2000
|
4 |
Jack Marin, Daniel Ragsdale and John Surdu, 'A Hybrid Approach to the profile Creation and Instrusion Detection,' Information Technology and Operations Center, United States Military Academy
|
5 |
Jonatan Gomez and Dipankar Dasgupta, 'Evolving Fuzzy Classifiers for Intrusion Detection,' Proceedings of the 2002 IEEE Workshop on Information Assurance, 2002
|
6 |
Zheng Zhang, Jun Li, C.N. Manikopoulos, Jay Jorgenson, Jose Ucles, 'HIDE : a Hierarchical Network Intrusion Detection System Using Statistical Preprocessing and Neural Network Classification,' proceedings of the 2001 IEEE Workshop on Information Assurance and Security, 2001
|
7 |
Srinivas Mukkamala, Guadalupe Janoski, Andrew Sung, 'Intrusion Detection : Support Vector Machines and Neural Networks,' New Mexico Institute of Mining and Technology
|
8 |
Hofmann, A., Schmitz, C, and Sick, B., 'Intrusion Detection in Computer Networks with Neural and Fuzzy Classifiers,' Springer LNCS, pp.316-324, 2003
|
9 |
LiMin Fu, 'Neural Networks in Computer Intelligence,' McGraw-Hill, Inc., 1994
|
10 |
http://www.ll.mit.edu/IST/ideval/data_index.html
|
11 |
Stephanie Forrest, Steven A. Hofmeyr, Anil Somayaji, Thomas A. Longstaff, 'A Sense of Self for Unix Processes,' In Proceedings of the 1996 IEEE Symposium on Security and Privacy, IEEE Computer Society Press, pp.120-128, 1996
DOI
|
12 |
박봉구, 한상언, 차병래, '컴퓨터를 활용한 이산수학', 교우사, pp.231-242, 2003
|
13 |
Dorothy E. Denning, 'An Intrusion-Detection Model,' IEEE Transaction on Software Engineering, Vol.SE-13, No.2, pp.222-232, February, 1987
DOI
ScienceOn
|
14 |
Wenke Lee, Salvatore J. Stolfo, Philip K. Chan, Eleazar Eskin, Wei Fan, Matthew Miller, Shlomo Hershkop and Junxin Zhang, 'Real Time Data Mining - based Intrusion Detection,' IEEE, 2001
DOI
|
15 |
Nong Ye and Xiangyang Li, 'A Scalable Clustering Technique for Intrusion Signature Recognition,' Proceedings of 2001 IEEE Workshop on Information Assurance and Security, 2001
|
16 |
Matthew V. Mahoney and Philip K. Chan, 'Learning Nonstationary Models of Normal Network Traffic for Detecting Novel Attacks,' 2002
DOI
|
17 |
Leonid Portnoy, 'Intrusion detection with unlabeled data using clustering,' Undergraduate Thesis, Columbia University, 2000
|
18 |
D. Barbara, N. Wu and S. Jajodia, 'Detecting novel network intrusions using bayes estimators,' In Proc. SIAM Intl. Conf. Data Mining, 2001
|
19 |
Jack Marin, Daniel Ragsdale and John Shurdu, 'A Hybrid Approach to the Profile Creation and Intrusion Detection,' Proceedings of DARPA Information Survivability Conference and Exposition, IEEE, 2001
DOI
|
20 |
Silicon Defence. Spade. In http://www.silicondefense.com/software/spice/, 2001
|
21 |
D. Anderson, T. Lunt, H. Javitz, A. Tamaru and A. Valdes, 'Detecting unusual program behavior using the statistical component of the next-generation intrusion detection expert system(nides),' In Technical Report SRI-CSL-95-06, SRI, 1995
|