[1]
M. Jawhar, and Mehrotra M., Intrusion Detection System: A design perspective, 2rd International Conference on Data Management, IMT Ghaziabad, (2009).
Google Scholar
[2]
M. Panda, and Patra M., Building an efficient network intrusion detection model using Self Organizing Maps, proceeding of world academy of science, engineering and technology, Vol. 38 Feb. (2009).
Google Scholar
[3]
M. Khattab Ali, Venus W, and Mamoun Suleiman Al Rababaa, The Affect of Fuzzification on Neural Networks Intrusion Detection System, IEEE, (2009).
DOI: 10.1109/iciea.2009.5138399
Google Scholar
[4]
B. Mykerjee, Heberlein L.T., and Levitt K.N., Network Intrusion Detection, IEEE Networks, Vol. 8, No. 3, 1994. PP. 14-26.
Google Scholar
[5]
W. Jung K., Integration Artificial Immune Algorithms for Intrusion Detection, dissertation in University of London, 2002, PP. 1-5.
Google Scholar
[6]
M. Al-Subaie, The power of sequential learning in anomaly intrusion detection, degree master thesis, Queen University, Canada, (2006).
Google Scholar
[7]
P. Kukielka, and Kotulski, Z., Analysis of different architectures of neural networks for application in intrusion detection systems, proceeding of the international multiconference on computer science and information technology, 2008, pp.807-811.
DOI: 10.1109/imcsit.2008.4747335
Google Scholar
[8]
M. Moradi, and Zulkernine M., A Neural Network based system for intrusion detection and classification of attacks, Queen University, Canada, (2004).
Google Scholar
[9]
D. Novikov, Roman V. Yampolskiy, and Leon Reznik, Artificial Intelligence Approaches For Intrusion Detection, IEEE, (2006).
DOI: 10.1109/lisat.2006.4302651
Google Scholar
[10]
L. de Sá Silva, Adriana C. Ferrari dos Santos, José Demisio S. da Silva, and Antonio Montes, A Neural Network Application for Attack Detection in Computer Networks, Instituto Nacional de Pesquisas Espaciais – INPE, BRAZIL, (2004).
DOI: 10.1109/ijcnn.2004.1380190
Google Scholar
[11]
Z. TIE-JUN and LI Yang, The Research of Intrusion Detection Based on Genetic Neural Network, Proceedings of the 2008 International Conference on Wavelet Analysis and Pattern Recognition, Hong Kong, IEEE, 30-31 Aug, (2008).
DOI: 10.1109/icwapr.2008.4635789
Google Scholar
[12]
J. Shum and Heidar A. Malki, Network Intrusion Detection System Using Neural Networks, Fourth International Conference on Natural Computation, IEEE, (2008).
DOI: 10.1109/icnc.2008.900
Google Scholar
[13]
D. Novikov, Roman V. Yampolskiy, and Leon Reznik, Anomaly Detection Based Intrusion Detection, Proceedings of the Third International Conference on Information Technology: New Generations, IEEE, (2006).
DOI: 10.1109/itng.2006.33
Google Scholar
[14]
I. Ahmad, Sami Ullah Swati and Sajjad Mohsin, Intrusions Detection Mechanism by Resilient Back Propagation (RPROP), European Journal of Scientific Research ISSN 1450-216X Vol. 17 No. 4, pp.523-531, (2007).
Google Scholar
[15]
Srinivas Mukkamala, Andrew H. Sung, and Ajith Abraham, Intrusion detection using an ensemble of intelligent paradigms, Journal of Network and Computer Applications 28. 2005, p.167–182.
DOI: 10.1016/j.jnca.2004.01.003
Google Scholar
[16]
S. Jimmy and Heidar A., Network Intrusion Detection System using Neural Networks, IEEE computer society, (2008).
Google Scholar
[17]
M. Vallipuram, and Robert B., An Intelligent Intrusion Detection System based on Neural Network, IADIS International Conference Applied Computing, (2004).
Google Scholar
[18]
J. Bezdek, C., pattern Recognition with Fuzzy Objective Function Algorithms,. Plenum, NewYork, (1981).
Google Scholar
[19]
Y. John, and Langari, R., Fuzzy Logic intelligence, control, and information, Publish by Dorling Kindersley, India, (2006).
Google Scholar
[20]
P. Kukiełka and Zbigniew Kotulski, Analysis of Different Architectures of Neural Networks for Application in Intrusion Detection Systems, Proceedings of the International Multiconference on Computer Science and Information Technology, IEEE, 2008, p.807.
DOI: 10.1109/imcsit.2008.4747335
Google Scholar
[21]
KDD-cup-dataset. http: /kdd. ics. uci. edu/database/ kddcupaa/kddcup. html.
Google Scholar
[22]
Loril D., Applying Soft Computing Techniques to intrusion Detection, Ph. D thesis, Dep. Of Computer Sce. University of Colorado at Colorado Spring, (2005).
Google Scholar