References | - James P. Anderson, “Computer security threat monitoring and surveillance,” Technical Report 98-17, James P. Anderson Co., Fort Washington, Pennsylvania, USA, April 1980.
- D. E. Denning, “An intrusion detection model,” IEEE Transaction on Software Engineering, SE-13(2), 1987, pp. 222-232.
- Daniel Barbara, Julia Couto, Sushil Jajodia, Leonard Popyack and Ningning Wu, “ADAM: Detecting intrusion by data mining,” IEEE Workshop on Information Assurance and Security, West Point, New York, June 5-6, pp. 11-16, 2001.
- Debra Anderson, Thane Frivold, and Alfonso Valdes, “NIDES Next-generation Intrusion Detection Expert System (NIDES)”, A Summary, Computer Science Laboratory,SRI-CSL-95-07,May 1995
- Te-Shun Chou and Tsung-Nan Chou, “Hybrid Classified Systems for Intrusion Detection,” Seventh Annual Communications Networks and Services Research Conference, pp. 286-291, 2009.
- N.B. Amor, S. Benferhat, and Z. Elouedi, “Naïve Bayes vs.decision trees in intrusion detection systems,” Proc. of 2004 ACM Symposium on Applied Computing, 2004, pp. 420-424.
- Yihua Liao and V. Rao Vimuri, “Using K-nearest Neighbour Classifier for Intrusion Detection,” Department Of Computer Scinece, University Of California.
- T. S. Chou, K. K. Yen, and J. Luo, Network Intrusion Detection Design Using Feature Selection of Soft Computing Paradigms,” World Academic of Science, Engineering and Technology, 47, pp. 529-541, 2008.
- Z. Muda, W. Yassin, M.N. Sulaiman and N.I. Udzir, “A K-Means and Naive Bayes Learning Approach for Better Intrusion Detection,” Information Technology Journal, 10, pp. 648-655, 2011.
- MIT linconin labs, 1999 ACM Conference on Knowledge Discovery and Data Mining (KDD) http://www.acm.org/sigs/sigkdd/kddcup/index.php?section=1999
- The KDD Archive. KDD99 cup dataset, 1999, http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html.
- M. Tavlle, E. Bagheri, W. Lu, and A. A. Gorbani, “A detailed analysis of the KDD CUP 99 Data Set,” Proc. of IEEE Symposium 1st Int’l Conf. on Recent Advances in Information Technology | RAIT-2012 |Computational Intelligence for Security and Defense Applications (CISDA'09), pp. 1-6, 2009.
- Mukkamala S., Janoski G., and Sung A.H., “Intrusion detection using neural networks and support vector machines,” In Proc. of the IEEE International Joint Conference on Neural Networks, 2002, pp.1702-1707.
- J. Zhang and M. Zulkernine, “A Hybrid Network Intrusion Detection Technique Using Random Forests,” Proc. of IEEE First International Conference on Availability, Reliability and Security (ARES’06), p. 8, 2006.
- D. Md. Farid, N. Harbi, S. Ahmmed, Md. Z. Rahman, and C. M. Rahman, “Mining Network Data for Intrusion Detection through Naïve Bayesian with Clustering”, World Academy of science, Engineering and Technology, 66, pp. 341-345, 2010.
|
---|