Citation: | MA Rui, LIU Yu-shu, DU Yan-hui. Intrusion Detection Approach Using Connectionist Expert System[J].JOURNAL OF BEIJING INSTITUTE OF TECHNOLOGY, 2005, 14(4): 467-470. |
[1] |
K umar S.Classification and detection of computer intr usio ns[D]. Indiana:Pur due U niversity, 1995.
|
[2] |
Cannady J.Ar tificial neural networ ks for misuse detection[Z]. T he 21st National Infor matio n Systems SecurityConference, Ar lington, 1998.
|
[3] |
A lpaslan F N, T olun M R.Connectionist ex pert system[Z]. A rtificial N eural N etw orks and Artificial Life Symposium, A nkara, 1994.
|
[4] |
Hagan M T, Demuth H B, Beale M H.N eural netwo rksdesign[M]. Beijing:China M achine P ress, 2002.
|
[5] |
G allant S I.Connectionist ex pert system[J]. Communications of ACM, 1988, 31(2):152-169.
|
[6] |
Hu S R.A pplication technology of neur al networks[M]. Changsha:N ational Defence Science and T echnology Universit y Press, 1998.(in Chinese)
|
[7] |
Wang S T.Fuzzy systems, fuzzy neural networ ks andapplications[M]. Shanghai:Shanghai Scientific andT echnical Documents Publishing House, 2001.(in Chinese)
|
[8] |
L iow R, V idal J J.A dual network ex pert system[EB/O L]. http:/www.cs.ucla.edu/~vidal/liow.html.
|