References
[1]. Chebrolu S., Abraham A., and Thomas J.P., (2005).
“Feature detection and ensemble design of intrusion
detection systems”, Compute Security, Vol.24,
pp.295–307.
[2]. Chen Y., Abraham A., and Yang J., (2005). “Feature
deduction and intrusion detection using flexible neural
trees”, Second IEEE International Symposium on Neural
Networks.
[3]. Chen, Z., L. Gao, and K. Kwiat, (2003). “Modeling the
Spread of Active Worms”, INFOCOM. Twenty-Second
Annual Joint Conference of the IEEE Computer and
Communications Societies, IEEE.
[4]. Chou T-S, and Yen KK, “Fuzzy belief k-nearest
neighbors anomaly detection of user to root and remote
to local attacks”, The 2007 IEEE workshop on information
assurance, United States Military Academy, West Point, NY,
pp.207–213.
[5]. Ghosh A.K., Schwartzbard A., and Schatz M., (1999).
“Learning program behavior profiles for intrusion
detection”, Workshop on intrusion detection and network
monitoring, Santa Clara, CA, USENIX.
[6]. Meystel, A.M. and Albus, J.M., (2002). “Intelligent
Systems Architecture, Design, and Control”, New York,
New York, John Wiley & Sons, Inc.
[7]. Mukkamala S, Sung A, Abraham, (2004). “Designing
intrusion detection systems: architectures and
perspectives”, The International Engineering Consortium
(IEC) Annual Review of Communications, Vol.57,
pp.1229–1241.