共 50 条
[31]
A Design and Implementation of Intrusion Detection System by using Data Mining
[J].
2014 FOURTH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT),
2014,
:700-704
[32]
Analysis on intrusion detection system using machine learning techniques
[J].
Lecture Notes on Data Engineering and Communications Technologies,
2021, 66
:423-441
[33]
A kind of multilayer intrusion detection system using mobile agent
[J].
2003 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-5, PROCEEDINGS,
2003,
:1951-1955
[34]
Anomaly Intrusion Detection System Using Gaussian Mixture Model
[J].
THIRD 2008 INTERNATIONAL CONFERENCE ON CONVERGENCE AND HYBRID INFORMATION TECHNOLOGY, VOL 1, PROCEEDINGS,
2008,
:1162-1167
[35]
Training of Intelligent Intrusion Detection System using Neuro Fuzzy
[J].
2014 15TH IEEE/ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNPD),
2014,
:95-100
[36]
Physical Intrusion Detection System Using Stereo Video Analytics
[J].
PROCEEDINGS OF 3RD INTERNATIONAL CONFERENCE ON COMPUTER VISION AND IMAGE PROCESSING, CVIP 2018, VOL 2,
2020, 1024
:173-182
[37]
Using fuzzy system to manage false alarms in intrusion detection
[J].
SECURITY AND PRIVACY IN THE AGE OF UNCERTAINTY,
2003, 122
:241-252
[38]
An Adaptive and Robust Device-Free Intrusion Detection Using Ubiquitous WiFi Signals
[J].
2018 IEEE 23RD INTERNATIONAL CONFERENCE ON DIGITAL SIGNAL PROCESSING (DSP),
2018,
[39]
A Survey on Intrusion Detection System Using Machine Learning Algorithms
[J].
INNOVATIVE DATA COMMUNICATION TECHNOLOGIES AND APPLICATION,
2020, 46
:670-675
[40]
Intrusion detection using system call sequences and construction of finite
[J].
8TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL II, PROCEEDINGS: COMPUTING TECHNIQUES,
2004,
:532-537