1 |
J.-S. R. Jang, C.-T. Sun, E. Mizutani, Neuro- Fuzzy and Soft Computing, Prentice-Hall International, Inc., 1997
|
2 |
R. L. Scheaffer, W. Mendenhall III, R. L. Ott, Elementary Survey Sampling, 5th edition, Duxbury Press, 1996
|
3 |
Kdd cup 1999 data set, http://kdd.ics.uci.edu/ databases/kddcup99/kddcup99.html, The UCI KDD Archive, University of California
|
4 |
C. Elkan, 'Results of the KDD'99 classifier learning,' ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp.63-64, 2000
DOI
|
5 |
Chi-Ho Tsang, S. Kwong and H. Wang, 'Anomaly intrusion detection using multi-objective genetic fuzzy system and agent-based evolutionary computation framework,' International Conference on Data Mining, IEEE, pp.789-792, 2005
DOI
|
6 |
김성은, 류정우, 김명원, '효율적인 지도 퍼지 군집화 를 위한 휴리스틱 분할 진화알고리즘', 한국종합 컴퓨터 학술대회 논문집, 한국정보과학회 제32권 제1호(B), pp.667-669, 2005
|
7 |
류정우, 김성은, 김명원, '효율적인 진화알고리즘을 이 용한 적응형 퍼지 분류 규칙 생성', 한국정보과학회 추계학술대회 논문집 제32권 2호, pp.769-771, 2005
|
8 |
J. Roubos, M. Setnes, J. Abonyi, 'Learning fuzzy classification rules from labeled data,' International Journal of Information Sciences, pp.77-93, 2003
DOI
ScienceOn
|
9 |
이홍섭, 2005 정보 보호 실태 조사, 한국정보보호진흥원, 2005
|
10 |
M. W. Kim, J. G. Lee, 'Classification Fuzzy Rule Generation Based on Fuzzy Decision Tree,' The Journal of Electrical Engineering and Information Science, Vol.5, NO.3, pp.264-272, 2000
|
11 |
C. Xiang, S. M. Lim, 'Design of multiple-level hybrid classifier for intrusion detection system,' Machine Learning for Signal Processing, IEEE, pp.117-122, 2005
|
12 |
J. Gomez, D. Dasgupta, 'Evolving fuzzy classifiers for intrusion detection,' International Proceedings of the IEEE Workshop on Information Assurance, 2002
|
13 |
J. Gomez, D. Dasgupta, O. Nasraoui, F. Gonzalez, 'Complete expression trees for evolving fuzzy classifier systems with genetic algorithms and application to network intrusion detection,' Fuzzy Information Processing Society, IEEE, pp.469-474, 2002
DOI
|