Detection of unknown computer worms based on behavioral classification of the host
Computational Statistics & Data Analysis
MLDM '07 Proceedings of the 5th international conference on Machine Learning and Data Mining in Pattern Recognition
Collaborative architecture for distributed intrusion detection system
CISDA'09 Proceedings of the Second IEEE international conference on Computational intelligence for security and defense applications
Network security using growing hierarchical self-organizing maps
ICANNGA'09 Proceedings of the 9th international conference on Adaptive and natural computing algorithms
A hybrid neural network approach to the classification of novel attacks for intrusion detection
ISPA'05 Proceedings of the Third international conference on Parallel and Distributed Processing and Applications
Intrusion detection using PCASOM neural networks
ISNN'06 Proceedings of the Third international conference on Advances in Neural Networks - Volume Part III
Y-Means: an autonomous clustering algorithm
HAIS'10 Proceedings of the 5th international conference on Hybrid Artificial Intelligence Systems - Volume Part I
An Optimum-Path Forest framework for intrusion detection in computer networks
Engineering Applications of Artificial Intelligence
Hi-index | 0.00 |
High-level linear modulation schemes utilized in moderndigital communication systems to achieve high bandwidthefficiency exhibit large peak-to-average power ratios(PAPRs), and the performance of the communicationtransceivers is very sensitive to nonlinear ...