Название: Intelligent Network Management and Control
Автор: Badr Benmammar
Издательство: John Wiley & Sons Limited
Жанр: Зарубежная компьютерная литература
isbn: 9781119817826
isbn:
Ahlan, A.R., Lubis, M., and Lubis, A.R. (2015). Information security awareness at the knowledge-based institution: Its antecedents and measures. Procedia Computer Science (PCS). 72(2015), 361–373.
Amodei, D., Olah, C., Steinhardt, J., Christiano, P., Schulman, J., and Mané. (2016). Concrete problems in AI safety [Online]. Cornell University. Available at: https://arxiv.org/abs/1606.06565.
Anderson, D., Frivold, T., and Valdes, A. (1995). Next-generation intrusion detection expert system (NIDES). Report, US Department of the Navy, Space and Naval Warfare Systems Command, San Diego.
Aslahi-Shahri, B.M., Rahmani, R., Chizari, M., Maralani, A., Eslami, M., Golkar, M.J., and Ebrahimi, A. (2016). A hybrid method consisting of GA and SVM for intrusion detection system. Neural Computing and Applications, 27(6), 1669–1676.
Bace, R.G. (2000). Intrusion Detection. Sams Publishing, Indianapolis.
Balan, E.V., Priyan, M.K., Gokulnath, C., and Devi, G.U. (2015). Fuzzy based intrusion detection systems in MANET. Procedia Computer Science, 50, 109–114.
Barth, C.J. and Mitchell, J.C. (2008). Robust defenses for cross-site request forgery. Proceedings of 15th ACM Conference. CCS, Alexandria.
Biggio, B., Nelson, B., and Laskov, P. (2012). Poisoning attacks against support vector machines. 29th International Conference on Machine Learning. ICML, Edinburgh, 1467–1474.
Capgemini Research Institute (2019). Reinventing cybersecurity with artificial intelligence: The new frontier in digital security [Online]. Available at: https://www.capgemini.com/wp-content/uploads/2019/07/AI-in-Cybersecurity_Report_2019 0711_V06.pdf.
Chebrolu, S., Abraham, A., and Thomas. (2005). Feature deduction and ensemble design of intrusion detection systems. Computers & Security, 24(4), 295–307.
Chen, W.-H., Hsu, S.-H., and Shen, H.-P. (2005). Application of SVM and ANN for intrusion detection. Computers & Operations Research, 32(10), 2617–2634.
Cova, M., Balzarotti, D., Felmetsger, V., and Vigna, G. (2007). Swaddler: An approach for the anomaly-based detection of state violations in web applications. Proceedings of the 10th International Symposium on Recent Advances in Intrusion Detection. RAID, Gold Coast.
Cova, M., Kruegel, C., and Vigna, G. (2010). Detection and analysis of drive-by-download attacks and malicious JavaScript code. Proceedings of the 19th International Conference on the World Wide Web. WWW, Raleigh.
Crockford, D. (2015). Json [Online]. Available at: https://github.com/douglascrockford/JSON-js/blob/master/README [Accessed March 2018].
Cunningham, R. and Lippmann, R. (2000). Detecting computer attackers: Recognizing patterns of malicious stealthy behavior. Presentation, CERIAS, Anderlecht.
Ertoz, L., Eilertson, E., Lazarevic, A., Tan, P.N., Kumar, V., Srivastava, J., & Dokas, P. (2004). Minds-Minnesota intrusion detection system. Next Generation Data Mining, August, 199–218.
Fortuna, C., Fortuna, B., and Mohorčič, M. (2002). Anomaly detection in computer networks using linear SVMs [Online]. Available at: http://ailab.ijs.si/dunja/SiKDD2007/Papers/Fortuna_Anomaly.pdf.
Hajimirzaei, B. and Navimipour, N.J. (2019). Intrusion detection for cloud computing using neural networks and artificial bee colony optimization algorithm. ICT Express, 5(1), 56–59.
Hamamoto, A.H., Carvalho, L.F., Sampaio, L.D.H., Abrão, T., & Proença Jr, M.L. (2018). Network anomaly detection system using genetic algorithm and fuzzy logic. Expert Systems with Applications, 92, 390–402.
Han, X., Xu, L., Ren, M., and Gu, W. (2015). A Naive Bayesian network intrusion detection algorithm based on principal component analysis. 7th International Conference on Information Technology in Medicine and Education. IEEE, Huangshan.
Heckerman, D. (2008). A tutorial on learning with Bayesian networks. Innovations in Bayesian Networks, Holmes, D.E. and Jain, L.C. (eds). Springer, Berlin, 33–82.
Hoque, M.S. et al. (2012). An implementation of intrusion detection system using genetic algorithm. International Journal of Network Security & Its Applications (IJNSA). AIRCC publisher, 4(2), 109–120.
Hu, J., Yu, X., Qiu, D., and Chen, H.H. (2009). A simple and efficient hidden Markov model scheme for host-based anomaly intrusion detection. IEEE Network, 23(1), 42–47.
Hwang, T.S., Lee, T.-J., and Lee, Y.-J. (2007). A three-tier IDS via data mining approach. Proceedings of the 3rd Annual ACM Workshop on Mining Network Data. ACM, San Diego.
Idris, N.B. and Shanmugam, B. (2005). Artificial intelligence techniques applied to intrusion detection. Annual IEEE India Conference (Indicon). IEEE, Chennai.
Ingham, K., Somayaji, A., Burge, J., and Forrest, S. (2007). Learning DFA representations of HTTP for protecting web applications. Journal of Computer Networks, 51(5), 1239–1255.
Kalaivani, S., Vikram, A., and Gopinath, G. (2019). An effective swarm optimization based intrusion detection classifier system for cloud computing. 5th International Conference on Advanced Computing & Communication Systems (ICACCS). IEEE, Coimbatore.
Kang, M.-J. and Kang, J.-W. (2016). Intrusion detection system using deep neural network for in-vehicle network security. PLOS ONE, 11(6), 1–17.
Khidzir, N.Z., Daud, K.A.M., Ismail, A.R., Ghani, M.S.A.A., and Ibrahim, M.A.H. (2018). Information Security Requirement: The Relationship Between Cybersecurity Risk Confidentiality, Integrity and Availability in Digital Social Media. Regional Conference on Science, Technology and Social Sciences (RCSTSS 2016). 4–6 December 2016, Penang, Malaysia.
Kim, J., Kim, J., Thu, H.L.T., and Kim, H. (2016). Long short term memory recurrent neural network classifier for intrusion detection. International Conference on Platform Technology and Service (PlatCon). IEEE, Jeju.
Kirdaa, E., Jovanovicb, N., Kruegelc, C., and Vigna, G. (2009). Client-side cross-site scripting protection. Computers & Security, 28(7), 592–604.
Kruegel, C., Mutz, D., Robertson, W., and Valeur, F. (2003). Bayesian event classification for intrusion detection. Proceedings of the 19th Annual Computer Security Applications Conference. IEEE, Las Vegas.
Kudłacik, P., Porwik, P., and Wesołowski, T. (2016). Fuzzy approach for intrusion detection based on user’s commands. Soft Computing, 20(7), 2705–2719.
Kumar, S., Krishna, C.R., and Solanki, A.K. (2018). A technique to resolve data integrity and confidentiality issues in a wireless sensor network. 8th International Conference on Cloud Computing, Data Science & Engineering (Confluence). IEEE, Noida.
Landwehr, C. (2008). Cybersecurity and artificial intelligence: From fixing the plumbing to smart water. IEEE, Security and Privacy, 6(5), 3–4.
Leung, СКАЧАТЬ