[1]
SUN Zhi-xin, XU Hong-xia. Survey of the Application Research of Fuzzy Technology to Intrusion Detection Systems, Journal of Nanjing University of Posts and Telecommunications (Natural science) Vol. 26 No. 4 Aug. 2006, 73-78.
Google Scholar
[2]
DICKERSON J E, TUSLIN J, KOUKOUSOULA O, et al. Fuzzy intrusion detection. Proceedings of IFSA World Congress and 20th NAFIPS international Conference. Vancouver, British Columbia, 2001: 1506-1510.
DOI: 10.1109/nafips.2001.943772
Google Scholar
[3]
WU Hui, XIE Yan-feng, ZHANG Zhong-lin. Intrusion Detection System Based on Fuzzy Choose-closed Principle. JOURNAL OF LANZHOU JIAOTONG UNIVERSITY, 2008, 27(6), 100-102.
Google Scholar
[4]
HUANG Guo-yan, CHANG Xu-liang, GAO Jian-pei. Application research of fuzzy logic theory in intrusion detection systems. Computer Engineering and Applications. 2010, 46(8), 110-112.
Google Scholar
[5]
He Xin-gui.Fuzzy theories and fuzzy techniques in knowledge processing[M].Beijing:National Defense Industry Press, 1998.
Google Scholar
[6]
AO Hong, CAI Hong-liu. Distributed intrusion detection systems based on fuzzy control technology. COMPUTER ENGINEERING AND DESIGN, 2006, 27(6).
Google Scholar
[7]
SHI F, Genetic algorithms for feature selection in an intrusion detection application, Dept Computer Science, Mississippi State University, (2000).
Google Scholar
[8]
MOHAJERANI M, MOEINI A, KIANIE M. NFIDS: A Neuro-Fuzzy Intrusion Detect System: Electronics 10th IEEE International Conference on Circuit and System. 2003: 351-354.
DOI: 10.1109/icecs.2003.1302048
Google Scholar
[9]
Chavan, S., Shah, K., Dave, N., et al. Adaptive neuro-fuzzy intrusion detection system[C], ITCC. 2004: 70-74.
Google Scholar