References
[ I ]. Choker Kotor, "Combining Multiple Techniques for
Intrusion Detection", international Journal of Computer
Science and Network Security, VOL,6 No.2B, February
2006.
[2]. Dong Seong Kin, Ho Nam Ngugen, Jong Sou Pork,
"Genetic Algorithm to improve SVM based Network
Intrusion Detection System", Advanced information
Networking and Application, Vol 2, Pg 155-158, March 28-
30, 2005 .
.
[3]. Geer D., "Behavior based Network Security goes
molnstreom", IEEE Computer Society, Vol 39, issue 3, Pg
14-17, March 2006
[4]. Huoizhi Li, Mukesh Singhoi, "Trust Management in
Distributed System" , IEEE Computer Society, Vol 40, issue
2, Pg 45-53, Feb 2007.
[5]. Huntley C. L, "A developmental view of System
security", IEEE Computer Society Vol 39, issue 1, Pg 113-
114, Jan 2006.
[6]. Jungck R Shim ssy, "Issues in high speed Internet
security" , IEEE Computer Society, Vol 37, Issue 7, Pg 36-
42, July 2004.
.
[7]. Kemmerer R A, Vigno G , "Hi ORA: Intrusion Detection
for Internet Security", Proceedings of the IEEE, Vol 93,
Issue 10, Pg 1848-1857, Oct 2005
[8]. Kemmerer R A, Vigno G , "Intrusion detection : O brief
history and overview", IEEE Computer Society, Vol 35,
Issue 4, Pg 27-30, April 2002.
,
[9].tackle T, Yosinsoc A, "Metodoto for Anomaly based
Security Protocol attack Detection", IEEE Transaction on
Knowledge and Data Engineering, Vol 16, issue 9, Pg
1157-11 68, Sept 2004
[ I 0]. Mishro A, Nodkomi K, Potcho A, "intrusion Detection
In wireless ad-hoc Network", IEEE Wireless
Communications, Vol 4, issue 1, Pg 48-60, Feb 2004.
[ I I ]. Nong Ye, Farley T, "A Scientific approach to cyber
attack detectlon", IEEE Computer Society, Vol 38, issue
11, Pg 55-61, Nov 2005
[ I 2]. Song Long Pao T, Po Wei Wong, "Net flow based
Intrusion Detection System", IEEE International
Conference on Networking sensing & Control, Vol-2, Pg
731-736, 2004.
[13]. Song Jun Hon, Sung Boo Cho, "Evolutionary neural
network for anomaly detection based on the behaviour
Of a program", IEEE Transaction on ystems, Man and
Cybernetics, Part B, Vol 36, issue 3, Pg 559-570, June
2006.
[14]. Sorosommo S T, Zhu Q A, Huff J, "Hierarchical
Kohonenen net for anomaly detection in Network
Security", IEEE transaction on Man and Cybernetics, Vol
35, issue 2, Pg 302-3 I 2, April 2005.
[I 5]. Vijairogovon V, Shoh D, Goigoii R Shoh D, Srinivoson
V, Bhotio L, "Marking Technique to isolate boundary router
and attacker" , IEEE Computer Society, Vol 40, issue 2, Pg
54-58, Feb 2007.
[ I 6]. Ying Dor Lin, Chih Wei Jon, Po Ching Lin, Yuon
Cheng Loi, "Designing an integrated Architecture for
Network Content Security Gateways", IEEE Computer
Society, Vol 39, issue I I , Pg 66-72, Nov 2006 .
[ I 7]. Yu F Loksmon T V, Motoyomo M A, Rote R H, "Efficient
Multi match Packet classification for Network Security
Application", IEEE Journal on Selected areas in
Communications, Vol 24, Issue 10, Pg 1805-1816, Oct
2006.