Genetic-fuzzy rule mining approach and evaluation of feature selection techniques for anomaly intrusion detection

CH Tsang, S Kwong, H Wang - Pattern Recognition, 2007 - Elsevier
Classification of intrusion attacks and normal network traffic is a challenging and critical
problem in pattern recognition and network security. In this paper, we present a novel …

Genetic-fuzzy rule mining approach and evaluation of feature selection techniques for anomaly intrusion detection

CH Tsang, S Kwong, H Wang - Pattern Recognition, 2007 - infona.pl
Classification of intrusion attacks and normal network traffic is a challenging and critical
problem in pattern recognition and network security. In this paper, we present a novel …

Genetic-fuzzy rule mining approach and evaluation of feature selection techniques for anomaly intrusion detection

CH TSANG, S KWONG, H WANG - Pattern Recognition, 2007 - scholars.ln.edu.hk
Classification of intrusion attacks and normal network traffic is a challenging and critical
problem in pattern recognition and network security. In this paper, we present a novel …

[PDF][PDF] Genetic-fuzzy rule mining approach and evaluation of feature selection techniques for anomaly intrusion detection

CH Tsang, S Kwong, H Wang - Pattern Recognition, 2007 - sci2s.ugr.es
Classification of intrusion attacks and normal network traffic is a challenging and critical
problem in pattern recognition and network security. In this paper, we present a novel …

Genetic-fuzzy rule mining approach and evaluation of feature selection techniques for anomaly intrusion detection

CH Tsang, S Kwong, H Wang - Pattern Recognition, 2007 - scholars.cityu.edu.hk
Classification of intrusion attacks and normal network traffic is a challenging and critical
problem in pattern recognition and network security. In this paper, we present a novel …

[PDF][PDF] Genetic-fuzzy rule mining approach and evaluation of feature selection techniques for anomaly intrusion detection

CH Tsang, S Kwong, H Wang - Pattern Recognition, 2007 - Citeseer
Classification of intrusion attacks and normal network traffic is a challenging and critical
problem in pattern recognition and network security. In this paper, we present a novel …

Genetic-fuzzy rule mining approach and evaluation of feature selection techniques for anomaly intrusion detection

CH Tsang, S Kwong, H Wang - Pattern Recognition, 2007 - ui.adsabs.harvard.edu
Classification of intrusion attacks and normal network traffic is a challenging and critical
problem in pattern recognition and network security. In this paper, we present a novel …

[引用][C] Genetic-fuzzy rule mining approach and evaluation of feature selection techniques for anomaly intrusion detection

CH TSANG, S KWONG, H WANG - Pattern recognition, 2007 - pascal-francis.inist.fr
Genetic-fuzzy rule mining approach and evaluation of feature selection techniques for
anomaly intrusion detection CNRS Inist Pascal-Francis CNRS Pascal and Francis …

[引用][C] Genetic-fuzzy rule mining approach and evaluation of feature selection techniques for anomaly intrusion detection

CH Tsang, S Kwong, H Wang - Pattern Recognition, 2007 - cir.nii.ac.jp
Genetic-fuzzy rule mining approach and evaluation of feature selection techniques for
anomaly intrusion detection | CiNii Research CiNii 国立情報学研究所 学術情報ナビゲータ[サイニィ …

Genetic-fuzzy rule mining approach and evaluation of feature selection techniques for anomaly intrusion detection

CH Tsang, S Kwong, H Wang - Pattern Recognition, 2007 - dl.acm.org
Classification of intrusion attacks and normal network traffic is a challenging and critical
problem in pattern recognition and network security. In this paper, we present a novel …