Identifying intrusions in computer networks with principal component analysis
暂无分享,去创建一个
[1] David G. Stork,et al. Pattern Classification , 1973 .
[2] Gene H. Golub,et al. Matrix computations , 1983 .
[3] Dorothy E. Denning,et al. An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.
[4] Richard A. Kemmerer,et al. State Transition Analysis: A Rule-Based Intrusion Detection Approach , 1995, IEEE Trans. Software Eng..
[5] Sandeep Kumar,et al. A Software Architecture to Support Misuse Intrusion Detection , 1995 .
[6] Peter G. Neumann,et al. EMERALD: Event Monitoring Enabling Responses to Anomalous Live Disturbances , 1997, CCS 2002.
[7] Wenke Lee,et al. A Data Mining Framework for Adaptive Intrusion Detection ∗ , 1998 .
[8] Salvatore J. Stolfo,et al. A data mining framework for building intrusion detection models , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).
[9] Salvatore J. Stolfo,et al. A framework for constructing features and models for intrusion detection systems , 2000, TSEC.
[10] Shigeo Abe DrEng. Pattern Classification , 2001, Springer London.
[11] Salvatore J. Stolfo,et al. A Geometric Framework for Unsupervised Anomaly Detection , 2002, Applications of Data Mining in Computer Security.
[12] Sushil Jajodia,et al. Applications of Data Mining in Computer Security , 2002, Advances in Information Security.
[13] A.N. Zincir-Heywood,et al. On the capability of an SOM based intrusion detection system , 2003, Proceedings of the International Joint Conference on Neural Networks, 2003..
[14] M. Shyu,et al. A Novel Anomaly Detection Scheme Based on Principal Component Classifier , 2003 .
[15] Xiangliang Zhang,et al. A Novel Intrusion Detection Method Based on Principle Component Analysis in Computer Security , 2004, ISNN.
[16] Jay Beale,et al. Snort 2.1 Intrusion Detection, Second Edition , 2004 .
[17] Wei Zhang,et al. A genetic clustering method for intrusion detection , 2004, Pattern Recognit..
[18] S. T. Sarasamma,et al. Hierarchical Kohonenen net for anomaly detection in network security , 2005, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).