Fuzzy Min-Max Neural Network-Based Intrusion Detection System

被引:2
作者
Chandrashekhar, Azad [1 ]
Kumar, Jha Vijay [1 ]
机构
[1] Birla Inst Technol Mesra, Dept Comp Sci & Engn, Ranchi 835215, Bihar, India
来源
PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON NANO-ELECTRONICS, CIRCUITS & COMMUNICATION SYSTEMS | 2017年 / 403卷
关键词
CLASSIFICATION;
D O I
10.1007/978-981-10-2999-8_15
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
引用
收藏
页码:191 / 202
页数:12
相关论文
共 29 条
[1]  
[Anonymous], 2000, ACM SIGKDD EXPLORATI
[2]  
[Anonymous], 2000, ACM SIGKDD EXPLORATI, DOI DOI 10.1145/846183.846201
[3]  
Azad Chandrashekhar, 2013, International Journal of Information Technology and Computer Science, V5, P75, DOI 10.5815/ijitcs.2013.08.08
[4]  
Azad C, 2014, INDIAN J SCI TECHNOL, V7, P781
[5]  
Baoping Gu, 2014, 2014 International Conference on Information Science, Electronics and Electrical Engineering (ISEEE), P1313, DOI 10.1109/InfoSEEE.2014.6947885
[6]   Bluebox: A policy-driven, host-based intrusion detection system [J].
Chari, Suresh N. ;
Cheng, Pau-Chen .
ACM Transactions on Information and System Security, 2003, 6 (02) :173-200
[7]   Efficient classification using parallel and scalable compressed model and its application on intrusion detection [J].
Chen, Tieming ;
Zhang, Xu ;
Jin, Shichao ;
Kim, Okhee .
EXPERT SYSTEMS WITH APPLICATIONS, 2014, 41 (13) :5972-5983
[8]   Alert correlation in collaborative intelligent intrusion detection systems-A survey [J].
Elshoush, Huwaida Tagelsir ;
Osman, Izzeldin Mohamed .
APPLIED SOFT COMPUTING, 2011, 11 (07) :4349-4365
[9]  
Gautam SK, 2015, COMPUTATIONAL INTELL, V3, P361
[10]  
Hall M., 2009, SIGKDD EXPLORATIONS, V11, P10, DOI [DOI 10.1145/1656274.1656278, 10.1145/1656274.1656278]