| 期刊論文1. | Kruegel, C.、Valeur, F.、Vigna, G.、Kemmerer, R. A.(2002)。Stateful intrusion detection for high-speed networks。IEEE Symposium on Security and Privacy,10,285-294。 | 2. | Hegazy, I. M.、Ahmed, T.(2005)。Evaluating how well agent-based IDS perform。IEEE Potentials,24(2),27-30。 | 3. | Sheriff, Joseph S.、Ayers, Rod(2003)。Intrusion detection: Methods and system。Information Management and computer security,11(5),222-229。 | 4. | Gupta, P.、McKeown, N.(2001)。Algorithms for packet classification。IEEE Network,15(2),24-32。 | 5. | Lippmann, Richard P.、Cunningham, Robert K.(2000)。Improving intrusion detection performance using keyword selection and neural networks。Computer Networks,34(4),597-603。 | 6. | Jake, Ryan、Lin, Meng-Jang(1998)。Intrusion Detection with Neural Networks。Advances in neural information processing systems,10,943。 | 7. | 李駿偉、田筱榮、黃世昆(20020300)。入侵偵測分析方法評估與比較。資訊安全通訊,8(2),21-37。 延伸查詢 | 8. | Pawlak, Z.、Słowiński, R.(1994)。Rough set approach to multi-attribute decision analysis。European Journal of Operational Research,72(3),443-459。 | 9. | Lee, W.、Stolfo, S. J.、Mok, K. W.(1999)。A data mining framework for building intrusion detection models。IEEE Symposium on Security and Privacy,13,120-132。 | 會議論文1. | 黃承龍、唐文政(2003)。應用約略集合於醫學與信用卡資料之分類。第九屆資訊管理暨實務研討會。台北:中原大學。 延伸查詢 | 2. | Al-Subaie, M.、Zulkernine, M.(2006)。Efficacy of Hidden Markov Models Over Neural Networks in Anomaly Intrusion Detection。30th Annual International Computer Software and Applications Conference。 | 3. | Anagnostopoulos, T.、Anagnostopoulos, C.、Hadjiefthymiades, S.(2005)。Enabling attack behavior prediction in ubiquitous environments。International Conference on Pervasive Services 2005。 | 4. | Burroughs, D. J.、Wilson, L. F.、Cybenko, G. V.(2002)。Analysis of distributed intrusion detection systems using Bayesian methods。21st IEEE International Performance Computing and Communications Conference 2002。 | 5. | Bonifacio, J. M.(1998)。Neural networks applied in intrusion detection systems。IEEE World Congress on Computational Intelligence。 | 6. | Gao, Bo、Ma, Hui-Ye、Yang, Yu-Hang(2002)。HMMs (Hidden Markov models) based on anomaly intrusion detection method。International Conference on Machine Learning and Cybernetics 2002,381-385。 | 7. | Bolzoni, D.、Etalle, S.、Hartel, P.(2006)。POSEIDON: a 2-tier anomaly-based network intrusion detection system。IEEE International Workshop on Information Assurance。 | 8. | Depren, M. O.、Topallar, M.、Anarim, E.、Ciliz, K.(2004)。Network-based anomaly intrusion detection system using SOMs。The IEEE 12th Signal Processing and Communications Applications Conference,76-79。 | 9. | Faour, A.、Leray, P.、Eter, B.(2006)。A SOM and Bayesian Network Architecture for Alert Filtering in Network Intrusion Detection Systems。International Conference on Information & Communication Technologies 2006。 | 10. | Gao, Fei、Sun, Jizhou、Wei, Zunce(2003)。The prediction role of hidden Markov model in intrusion detection。Canadian Conference on Electrical and Computer Engineering,893-896。 | 11. | Guan, Jian、Liu, Da-Xin、Cui, Bin-Ge(2004)。An induction learning approach for building intrusion detection models using genetic algorithms。Intelligent Control and Automation, Fifth World Congress。 | 12. | Charitakis, I.、Anagnostakis, K.、Markatos, E.(2003)。An active traffic splitter architecture for intrusion detection。11th IEEE/ACM International Symposium on Modeling, Analysis and Simulation of Computer Telecommunications Systems, 2003,238-241。 | 13. | Kruegel, C.(2003)。Bayesian event classification for intrusion detection。19th Annual Computer Security Applications Conference,14-23。 | 14. | Kussul, N.(2003)。Intelligent multi-agent information security system。The Second IEEE International Workshop,120-122。 | 15. | Lei, J. Z.、Ghorbani, A.(2004)。Network intrusion detection using an improved competitive learning neural network。The Second Annual Conference on Communication Networks and Services Research,190-197。 | 16. | Wang, Lina(2001)。Method of evolutionary neural network-based intrusion detection。2001 International Conferences on Info-Tech and Info-Net,13-18。 | 17. | Ouyang, Ming-Guang、Wang, Wei-Nong、Zhang, Yun-Tao(2002)。A fuzzy comprehensive evaluation based distributed intrusion detection。International Conference on Machine Learning and Cybernetics,281-284。 | 18. | Mill, J.、Inoue, A.(2004)。Support vector classifiers and network intrusion detection。2004 IEEE International Conference on Fuzzy Systems,407-410。 | 19. | Orfila, A.、Carbó, J.、Ribagorda, A.(2003)。A Fuzzy logic on decision model for IDS, Fuzzy Systems。The 12th IEEE International Conference。 | 20. | Han, Sang-Jun、Cho, Sung-Bae(2003)。Rule-based integration of multiple measure-models for effective intrusion detection Systems。2003 IEEE International Conference on Systems, Man and Cybernetics。 | 21. | Lu, Wei、Traore, I.(2003)。Detecting New Forms of Network Intrusion Using Genetic Programming。The 2003 Congress on Evolutionary Computation,2165-2172。 | 22. | Zhang, Xueqin、Gu, Chunhua、Lin, Jiajun(2006)。Support Vector Machines for Anomaly Detection。2006 6th World Congress on Intelligent Control and Automation。 | 23. | Yang, Xiang-Rong、Song, Qin-Bao、Shen, Jun-Yi(2001)。Implementation of sequence patterns mining in network intrusion detection system。2001 International Conferences on Info-Tech and Info-Net,19-23。 | 24. | Kou, Yufeng(2004)。Survey of fraud detection techniques。IEEE International Conference on Networking, Sensing and Control,749-754。 | 25. | Zhang, Zonghua、Shen, Hong(2004)。Online training of SVMs for real-time intrusion detection。18th International Conference on Advanced Information Networking and Applications, 2004。 | 26. | Xu, Zhoujun、Sun, Jizhou、Li, Wenjie(2004)。Intrusion detection using fuzzy window Markov model。Canadian Conference on Electrical and Computer Engineering 2004。 | 27. | Fayyad, U. M.、Irani, K. B.(1993)。Multi-interval discretization of continuous-valued attributes for classification learning。The 13th International Joint Conference on Artificial Intelligence,1002-1007。 | 學位論文1. | 吳文進(2004)。利用排除的觀念改善入侵偵測特徵比對效能之研究(碩士論文)。華梵大學。 延伸查詢 | 圖書1. | 行政院科技顧問組(20080314)。2008資通安全政策白皮書。台北:行政院科技顧問組。 延伸查詢 | 2. | Schneier, Bruce、吳蔓玲(2001)。祕密與謊言--如何建構網路安全防護系統。台北:商周。 延伸查詢 | 3. | Northcutt, Stephen、Novak, Judy、陳正昌(2002)。網路入侵偵測教戰手冊。台北:培生教育。 延伸查詢 | 4. | Bace, Rebecca Gurley、賴冠州(2001)。駭客入侵偵測專業手冊。台北:旗標出版社。 延伸查詢 | 5. | Beale, Jay(2003)。Snort 2.0 Intrusion Detection。Syngress。 | 6. | Proctor, Paul E.(2000)。The Practical Intrusion Detection Handbook。Prentice Hall。 | 7. | Bace, Rebecca、Mell, Peter(2003)。An overview of issues in testing intrusion detection systems。Gaithersburg:U.S. Dept. of Commerce, National Institute of Standards and Technology。 | 8. | 葉怡成(2003)。類神經網路模式--應用與實作。台北:儒林圖書公司。 延伸查詢 | 9. | Pawlak, Z.(1991)。Rough Sets: Theoretical Aspects of Reasoning about Data。Kluwer Academic Publishers。 | 10. | Han, Jiawei、Kamber, Micheline(2001)。Data mining: concepts and techniques。Oxford, CA:Morgan Kaufmann Publisher, Inc.。 | 11. | Vapnik, Vladimir N.(1998)。Statistical Learning Theory。John Wiley and Sons, Inc.。 | 12. | Cristianini, N.、Shawe-Taylor, John(2000)。An Introduction to Support Vector Machines and Other Kernel-based Learning Methods。Cambridge University Press。 | 其他1. | SANS Institute(2001)。Application of Neural Networks to Intrusion Detection,http://www.sans.org/reading_room/whitepapers/detection/336.php, 2008/03/10。 | |
| |