ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
An Anomaly Intrusion Detection Approach Using Cellular Neural Networks
Computer and Information Sciences – ISCIS 2006 - Lecture Notes in Computer Science
◽
10.1007/11902140_94
◽
2006
◽
pp. 908-917
◽
Cited By ~ 2
Author(s):
Zhongxue Yang
◽
Adem Karahoca
Keyword(s):
Neural Networks
◽
Intrusion Detection
◽
Cellular Neural Networks
◽
Detection Approach
◽
Anomaly Intrusion Detection
Download Full-text
Related Documents
Cited By
References
Anomaly Intrusion Detection for System Call Using the Soundex Algorithm and Neural Networks
10th IEEE Symposium on Computers and Communications (ISCC'05)
◽
10.1109/iscc.2005.33
◽
2005
◽
Author(s):
ByungRae Cha
◽
B. Vaidya
◽
Seungjo Han
Keyword(s):
Neural Networks
◽
Intrusion Detection
◽
System Call
◽
Anomaly Intrusion Detection
Download Full-text
Analyzing flow-based anomaly intrusion detection using Replicator Neural Networks
2016 14th Annual Conference on Privacy, Security and Trust (PST)
◽
10.1109/pst.2016.7906980
◽
2016
◽
Cited By ~ 11
Author(s):
Carlos Garcia Cordero
◽
Sascha Hauke
◽
Max Muhlhauser
◽
Mathias Fischer
Keyword(s):
Neural Networks
◽
Intrusion Detection
◽
Anomaly Intrusion Detection
Download Full-text
A novel adaptive intrusion detection approach based on comparison of neural networks and idiotypic networks
2009 2nd International Workshop on Nonlinear Dynamics and Synchronization
◽
10.1109/inds.2009.5228006
◽
2009
◽
Cited By ~ 6
Author(s):
Linhui Zhao
◽
Xin Fang
◽
Yaping Dai
Keyword(s):
Neural Networks
◽
Intrusion Detection
◽
Detection Approach
◽
Idiotypic Networks
Download Full-text
High‐performance anomaly intrusion detection system with ensemble neural networks on reconfigurable hardware
Concurrency and Computation Practice and Experience
◽
10.1002/cpe.6370
◽
2021
◽
Author(s):
Tran Ngoc Thinh
◽
Tran Hoang Quoc Bao
◽
Duc‐Minh Ngo
◽
Cuong Pham‐Quoc
Keyword(s):
Neural Networks
◽
Intrusion Detection
◽
Intrusion Detection System
◽
High Performance
◽
Detection System
◽
Reconfigurable Hardware
◽
Performance Anomaly
◽
Ensemble Neural Networks
◽
Anomaly Intrusion Detection
Download Full-text
Anomaly Intrusion Detection using Fuzzy Membership Function and Neural Networks
The KIPS Transactions PartC
◽
10.3745/kipstc.2004.11c.5.595
◽
2004
◽
Vol 11C
(5)
◽
pp. 595-604
Keyword(s):
Neural Networks
◽
Intrusion Detection
◽
Membership Function
◽
Fuzzy Membership
◽
Fuzzy Membership Function
◽
Anomaly Intrusion Detection
Download Full-text
Anomaly Intrusion Detection Approach Using Hybrid MLP/CNN Neural Network
Sixth International Conference on Intelligent Systems Design and Applications
◽
10.1109/isda.2006.253765
◽
2006
◽
Cited By ~ 16
Author(s):
Yu Yao
◽
Yang Wei
◽
Fu-Xiang Gao
◽
Yu Ge
Keyword(s):
Neural Network
◽
Intrusion Detection
◽
Detection Approach
◽
Anomaly Intrusion Detection
Download Full-text
Research of Hierarchical Intrusion Detection Model Based on Discrete Cellular Neural Networks
Journal of Information and Computational Science
◽
10.12733/jics20102446
◽
2013
◽
Vol 10
(17)
◽
pp. 5569-5578
◽
Cited By ~ 1
Author(s):
Kang Xie
Keyword(s):
Neural Networks
◽
Intrusion Detection
◽
Cellular Neural Networks
◽
Detection Model
◽
Model Based
Download Full-text
Using Fuzzy Neural Networks and rule heuristics for anomaly intrusion detection on database connection
2008 International Conference on Machine Learning and Cybernetics
◽
10.1109/icmlc.2008.4621030
◽
2008
◽
Cited By ~ 1
Author(s):
Rung-Ching Chen
◽
Kai-Fang Cheng
◽
Cheng-Chia Hsieh
Keyword(s):
Neural Networks
◽
Intrusion Detection
◽
Fuzzy Neural Networks
◽
Fuzzy Neural
◽
Anomaly Intrusion Detection
Download Full-text
Efficacy of Hidden Markov Models Over Neural Networks in Anomaly Intrusion Detection
30th Annual International Computer Software and Applications Conference (COMPSAC'06)
◽
10.1109/compsac.2006.40
◽
2006
◽
Cited By ~ 11
Author(s):
Mohammad Al-Subaie
◽
Mohammad Zulkernine
Keyword(s):
Neural Networks
◽
Intrusion Detection
◽
Hidden Markov Models
◽
Markov Models
◽
Hidden Markov
◽
Anomaly Intrusion Detection
Download Full-text
An overview of neural networks use in anomaly Intrusion Detection Systems
2009 IEEE Student Conference on Research and Development (SCOReD)
◽
10.1109/scored.2009.5443289
◽
2009
◽
Cited By ~ 6
Author(s):
Yusuf Sani
◽
Ahmed Mohamedou
◽
Khalid Ali
◽
Anahita Farjamfar
◽
Mohamed Azman
◽
...
Keyword(s):
Neural Networks
◽
Intrusion Detection
◽
Intrusion Detection Systems
◽
Detection Systems
◽
Anomaly Intrusion Detection
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close