Vous êtes sur la page 1sur 1

[1] Panos Louvieris , Natalie Clewley, Xiaohui Liu, Effects-based feature identification for network intrusion detection , Neurocomputing

121 (9) (12-2013), 26527. [2] P. Garca-Teodoroa, J. Daz-Verdejoa, G. Macia-Fernandeza, E. Vazquezb , Anomalybased network intrusion detection:Techniques, systems and challenges, Computer & Security 28 (2009) 18-28. [3] Shelly Xiaonan Wu, Wolfgang Banzhaf, The use of computational intelligence in intrusion detection systems, Applied Soft Computing 10 (2010) 135. [4] Sandhya Peddabachigaria, Ajith Abrahamb,Crina Grosanc, Johnson Thomasa,Modeling intrusion detection system using hybrid intelligent systems, Network & Computer Applications 30 (2007) 114-132. [5] Dewan Md. Farid, Nouria Harbi, and Mohammad Zahidur Rahman,Combining Naive Bayes and Decision Tree for adaptive intrusion detection, Network Security & Its Applications (IJNSA), Volume 2, Number 2, April 2010. [6] Dewan Md. Farid, Nouria Harbi, Suman Ahmmed, Md. Zahidur Rahman,Mining Network Data for Intrusion Detection through Nave Bayesian with Clustering, World Academy of Science, Engineering and Technology 42 2010. [7] Vijay Kumar, Sunil Kumar, Ajay Kumar Singh,Outlier Detection: A Clustering-Based Approach, Science and Modern Engineering ISSN: 2319-6386, Volume-1, Issue-7, June 2013. [8] T. Velmurugan and T. Santhanam,A Survey of partition based clustering algorithms in data mining:An Experimental Approach, Information Technology Journal 10 (3):478-484 ,2011. [9] A.Patcha, J.-M.Park, An overview of anomaly detection techniques: existing solutions and latest Technological trends, Comput.Networks 51 (12) (2007) 34483470. [10] J. J. Davis, A. J. Clark, Data for anomaly based network intrusion detection: a Review,Comput.Secur.30 (6-7) (2011) 353375. [11] J. Beale, J.C. Foster, J.Posluns,Snort 2.0 Intrusion Detection, Syngress Publishing, Inc,Rockland,2003. [12] Thuzar Hlaing, Feature Selection and Fuzzy Decision Tree for Network Intrusion Detection, (IJICT) Vol.1, No.2, December 2012, pp. 109-118. [13] T. Velmurugan and T. Santhanam ,A Survey of partition based clustering algorithms in data mining:An Experimental Approach, Information Technology Journal 10 (3):478-484 ,2011. [14] Iftikhar Ahmad, Azween Abdullah, Abdullah Alghamdi, Khalid Alnfajan, Intrusion detection using feature subset selection based on MLP, Scientific Research and Essays Vol. 6(34), pp. 6804-6810, 30 December, 2011. [15] Z. Xue,Y.Shang,A.Feng,Semi-supervised outlier detection based on fuzzy rough Cmeans Clustering,Math.Comput.Simul80(9)(2010)19111921.