Using information theory in pattern recognition for intrusion detection

被引:0
|
作者
Madani, Meysam. [1 ]
Nowroozi, Alireza. [2 ]
机构
[1] Department of mathematics, Sharif University, Tehran, Iran
[2] Department of Mathematics and Computer Science, Amirkabir University of Technology, Iran
来源
Journal of Theoretical and Applied Information Technology | 2011年 / 34卷 / 02期
关键词
Compilation and indexing terms; Copyright 2025 Elsevier Inc;
D O I
暂无
中图分类号
学科分类号
摘要
Network security - Intrusion detection - Pattern recognition
引用
收藏
页码:138 / 142
相关论文
共 50 条
  • [1] The impact of privacy and data protection legislation on the sharing of intrusion detection information
    Johnston, Steven R.
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2015, 2212 : 150 - 171
  • [2] Pattern recognition using discriminative feature extraction
    ATR Human Information Processing, Research Lab, Kyoto, Japan
    IEEE Trans Signal Process, 1600, 2 (500-504):
  • [3] Methods for Low Footprint Intrusion Detection Using Ensemble Learning
    Shafieian, Saeed
    ProQuest Dissertations and Theses Global, 2022,
  • [4] IDuFG: Introducing an intrusion detection using hybrid fuzzy genetic approach
    Sharif University of Technology, International Campus, Kish Island, Iran
    不详
    Int. J. Netw. Secur., 6 (754-770): : 754 - 770
  • [5] Pattern recognition approaches to Japanese character recognition
    Das, Soumendu
    Banerjee, Sreeparna
    Advances in Intelligent and Soft Computing, 2012, 166 AISC (VOL. 1): : 83 - 92
  • [6] A new approach to intrusion detection system
    Laboratoire de Recherche en Informatique et Télécommunications, Faculty of Sciences, University of Mohammed V, Rabat, Morocco
    J. Theor. Appl. Inf. Technol., 2 (284-289):
  • [7] Industrial Internet of Things Intrusion Detection Method Using Machine Learning and Optimization Techniques
    Gaber T.
    Awotunde J.B.
    Folorunso S.O.
    Ajagbe S.A.
    Eldesouky E.
    Wireless Communications and Mobile Computing, 2023, 2023
  • [8] Detection of trojan HW by using hidden information on the system
    School of Engineering, Bar Ilan University, Ramat Gan, Israel
    不详
    Proc. IEEE Int. On-Line Test. Symp., IOLTS, (192-193):
  • [9] Analysis of Intelligent Classifiers and Enhancing the Detection Accuracy for Intrusion Detection System
    School of Computing, Teesside University, Middlesbrough, United Kingdom
    Int. J. Comput. Intell. Syst., 5 (841-853):
  • [10] PATTERN RECOGNITION OF AN OBJECT BY GRASPING.
    Okada, T.
    Bulletin of the Electrotechnical Laboratory, Tokyo, 1976, 40 (09): : 733 - 747