1 |
Jian Yu and Miin-Shen Yang, 'Optimality Test for Generalized FCM and Its Application to Parameter Selection', IEEE Transactions on Fuzzy Systems, Vol. 13, No. 1, Feb. 2005
DOI
ScienceOn
|
2 |
Jianyong Dai, Joohan Lee and Morgan C. Wang, 'Detecting Unknown Computer Virus Using Data Mining Techniques', Business Intelligent Symposium, poster presentation, April, 2006
|
3 |
I. Witten and E. Frank, 'Data mining: Practical machine learning tools and techniques with java implementations', Morgan Kaufmann, San francisco, CA, 2000
|
4 |
Kolter, J.Z., and Maloof, M. A., 'Learning to detect malicious executables in the wild', In Proceedings of the Tenth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 470-478. New York, NY, 2004
|
5 |
InSeon Yoo, 'Visualizing Windows Executable Viruses Using Self-Organizing Maps', Proceedings of the 2004 ACM workshop on Visualization and Data Mining for Computer Security, 2004
|
6 |
VX Heaven : http://vx.netlux.org
|
7 |
http://www.datarescue.com
|
8 |
Gupta, M. M., Jin, L., and Homma, N., Static and Dynamic Neural Networks : From Fundamentals to Advanced Theory, Wiley-IEEE Press, April 2004
|
9 |
Yi-Ta Wu, Yoo Jung An, James Geller and Yih-Tyng Wu, 'A Data Mining Based Genetic Algorithm', Proc. og the 4th IEEE workshop on SEUS-WCCIA, 2006
DOI
|
10 |
J. C. Bezdek, 'Pattern Recognition with Fuzzy Objective Function Algorithms', Plenum press, New York, 1981
|
11 |
이현숙, '퍼지 성능 측정자를 이용한 적응 데이터 마이닝 모델', 정보처리학회 논문지, 제13-B권 5호, 2006
과학기술학회마을
DOI
ScienceOn
|
12 |
Constantinos Constantinopoulos and Aristidis Likas, 'An Incremental Training Method for the Probabilistic RBF Network', IEEE Trans. on Neural Networks, Vol. 17, No. 4, July 2006
DOI
ScienceOn
|
13 |
G. Tesauro, J. Kephart, and G. Sorkin, 'Neural networks for computer virus recognition', IEEE Expert, 11:5-6, August 1996
DOI
ScienceOn
|
14 |
Abou-Assaleh, Nick Cercone, Vlado Keselj, and Ray Sweidan, 'Detection of New Malicious Code Using N-grams Signatures, Proceedings of the Second Annual Conference on Privacy, Security and Trust (PST'04), pp. 193-196, 2004
|
15 |
Vicente O. Baez-Monroy and Simon O'Keefe, 'Modelling Incremental Learning With The Batch SOM Training Method', Proc. of 5th International Conference on HIS, 2005
|
16 |
William Arnold, Gerald Tesauro, 'Automatically generated Win32 heuristic virus detection', Virus Bulletin conference, September, 2000
|