THÔNG TIN TÀI LIỆU
Thông tin cơ bản
Định dạng | |
---|---|
Số trang | 77 |
Dung lượng | 1,35 MB |
Nội dung
Ngày đăng: 16/12/2017, 21:41
Nguồn tham khảo
Tài liệu tham khảo | Loại | Chi tiết | ||||||
---|---|---|---|---|---|---|---|---|
[9] L.J. Fogel, et all (1965). “Artifici l Intelligence through Simulation of Evolution”, In: A. C ll h n et ll, Eds. Biophisics nd Cy ernetic Systems, Spartan, Washington DC, pp.131 - 156 | Sách, tạp chí |
|
||||||
[1] T. Back (1996). Evolutionary Algorithms in Theory and Practice. Oxford University Press, Oxford, UK | Khác | |||||||
[2] B. Balajinath and S. Raghavan. Intrusion Detection Through Learning Behavior Model. pp. 1202-1212, Computer Communications, Vol. 24, No. 12.July 2001 | Khác | |||||||
[3] S.M. Bridges and Rayford M. Vaughn. Fuzzy Data Mining and Genetic Algorithms Applied to Intrusion Detection. Proceedings of the Twenty-third National Information Systems Security Conference, Baltimore, MD, October 2000 | Khác | |||||||
[4] A. Chittur, Model Generation for an Inrmsion Detection System using Genetic Algorithm High School Honors Thesis, 2002 | Khác | |||||||
[5] Mark Ciampa, Ph.D. Security + Guide to Network Security Fundamentals, Fourth Edition | Khác | |||||||
[6] M. Crosbie and Gene Spafford. Applying Genetic Programming to Inmion Detection. Technical Repon FS-95-01, AAA1 Fall Symposium Series, AAA1 Press, 1995 | Khác | |||||||
[7] B. Dharamkar, Rajni Ranjan Singh. A Review of Cyber Attack Classification Technique Based on Data Mining and Neural Network Approach | Khác | |||||||
[8] D.B. Fogel (1998), Ed. Evolutionary Computation: the Fossil Record, IEEE Press, Piscataway, NJ | Khác | |||||||
[10] J. Furnkranz et al.. Foundations of Rule Learning. Cognitive Technologies, © Springer-Verlag Berlin Heidelberg 2012 | Khác | |||||||
[11] A.K. Ghosh, J. Wanken, and F. Chamn. Detecting Anomalous and Unknown Intrusions against Programs. In Proceedings of the 14th Annual Computer Security Applications Conference, pages 259-267, December 1998 | Khác | |||||||
[12] J. Gomez, D. Dasgupta, O. Nasaroui, and F. Gonzalez. Complete Expression Trees for Evolving Fuzzy Classifiers Systems with Genetic Algorithms and Application to Network Intrusion Detection. In Proceedings of NAFIPSFLINT joint Conference, pages 469-474, New Orleans, LA, June 2002 | Khác | |||||||
[13] John. H Holland, ed. 1975. Adaptation in Natural and Artificial Systems. University of Michigan Press: Ann Arbor, MI | Khác | |||||||
[14] John. Koza. Genetic Programming: on the Programming of Computer by Means of Natural Selection, MIT Press, Cambride, MA, USA, 1992 | Khác | |||||||
[16] Wei Lu, Issa Traore. Detecting New Forms of Network Intrusion Using Genetic Programming. Department of Electrical and Computer Engineering University of Victoria, 2003 | Khác | |||||||
[17] Lodovic Me. Genetic Algorithms, an Alternative Tool for Security Audit Trails Analysis, Technical report, Supelec, France, 1992 | Khác | |||||||
[18] H.P. Schwefel, R. Manner (1995), Eds. Evolution and Optimum Seeking, Wiley, New York | Khác | |||||||
[19] Pham Truong Son, Nguyen Quang Uy, Nguyen Xuan Hoai. Generating Ar tificial Attack Data for Intrusion Detection Using Machine Learning. Le Quy Don University and Ha Noi University, Hanoi, Vietnam, December 2014 | Khác | |||||||
[20] Wei Wang, Sylvain Gombault, Thomas Guyet . Towards fast Detecting Intrusions - Using Key Attributes of Network Traffic. France | Khác |
TỪ KHÓA LIÊN QUAN
TÀI LIỆU CÙNG NGƯỜI DÙNG
TÀI LIỆU LIÊN QUAN