References
[1]. Meystel, A.M. &Albus, J.M., (2002). Intelligent Systems
Architecture, Design, and Control. New York, New York,
John Wiley & Sons, Inc.
[2]. Hentea, M. (1997). “Architecture and design issues in a
hybrid knowledge-based expert system for intelligent
quality control”. PhD Thesis, Illinois Institute of Technology,
Chicago, Illinois.
[3]. Hentea, M. (1999). “Intelligent approach for network
management system: Architecture and design issues for
ATM computer networks”. Proceedings of 1999 Advanced
Simulation Technologies Conference, San Diego,
California.
[4]. Hentea, M. (2003). “Intelligent model for cyber attack
detection and prevention”. Proceedings of the ISCA 12th
International Conference Intelligent and Adaptive Systems and Software Engineering, San Francisco,
California, pp. 5-10.
[5]. Hentea, M. (2004). “Data mining descriptive model for
intrusion detection systems”. Proceedings of the 2004
Information Resources Management Association
International Conference, New Orleans, Louisiana, pp.
1118-1119.
[6]. Hentea, M. (2005a). “Improving intrusion awareness
with a neural network classifier”. Proceedings of the ISCA
14th International Conference Intelligent and Adaptive
Systems and Software Engineering, Toronto, Canada,
163-168
[7]. Hentea, M. (2005b). “Use of reconnaissance patterns
for intelligent monitoring model”. Proceedings of the 2005
Information Resources Management Association International Conference, San Diego, California, pp. 160-
163.
[8]. Hentea, M. (2006). “Enhancing information security
risk management with a fuzzy model”. Proceedings of
19th International Conference on Computer
Applications in Industry and Engineering, Las Vegas,
Nevada, pp. 32-139.
[9]. Wang, W. (2005). The Intelligent Proactive Information
Assurance and Security Technology. Retrieved on
January 5, 2005.
[10]. Wang, J., et al., (2007). "Internet Worm Early
Detection and Response Mechanism". The Journal of
China Universities of Posts and Telecommunications, Vol.
14, No. 3,