Organic computing ? on the feasibility of controlled emergence, Conf. on Hardware/Software Codesign and System Synthesis, pp.2-5, 2004. ,
A fusion-based intrusion detection architecture with organic behavior, The first CRIS Int. Workshop on Critical Information Infrastructures (CIIW), pp.47-56, 2005. ,
A framework for largescale simulation of collaborative intrusion detection, IEEE Conf. on Soft Computing in Industrial Applications (SMCia/08), pp.125-130, 2008. ,
On-line intrusion alert aggregation with generative data stream modeling ,
Intrusion detection systems: A survey and taxonomy, 2000. ,
DIDS (distributed intrusion detection system) ? motivation, architecture, and an early prototype, Proc. of the 15th IEEE National Computer Security Conf, pp.167-176, 1992. ,
Global intrusion detection in the domino overlay system, Proc. of the Network and Distributed System Security Symp., NDSS, 2004. ,
A distributed intrusion detection prototype using security agents, Proc. of the 6th Int. Conf., on Software Engineering, Artificial Intelligence, Networking and Parallel and Distributed Computing, pp.238-245, 2004. ,
Distributed intrusion detection based on clustering, Proc. of 2005 Int. Conf. on Machine Learning and Cybernetics, pp.2379-2383, 2005. ,
Fuzzy intrusion detection, Proceedings Joint 9th IFSA World Congress and 20th NAFIPS International Conference (Cat. No. 01TH8569), pp.1506-1510, 2001. ,
DOI : 10.1109/NAFIPS.2001.943772
The artificial immune model for network intrusion detection, 7th European Conf. on Intelligent Techniques and Soft Computing (EUFIT'99), 1999. ,
GP Ensemble for Distributed Intrusion Detection Systems, Proc. of the 3rd Int. Conf. on Advances in Pattern Recognition, pp.54-62, 2005. ,
DOI : 10.1007/11551188_6
Training of radial basis function classifiers with resilient propagation and variational Bayesian inference, 2009 International Joint Conference on Neural Networks, pp.838-847, 2009. ,
DOI : 10.1109/IJCNN.2009.5178699
Pattern Recognition and Machine Learning, 2006. ,
Evaluating intrusion detection systems: the 1998 DARPA off-line intrusion detection evaluation, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00, pp.12-26, 2000. ,
DOI : 10.1109/DISCEX.2000.821506
Testing Intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory, ACM Transactions on Information and System Security, vol.3, issue.4 ,
DOI : 10.1145/382912.382923
Snort ? lightweight intrusion detection for networks, LISA '99: Proc. of the 13th USENIX Conf. on System Administration, pp.229-238, 1999. ,