Open Access Journal

ISSN : 2394 - 6849 (Online)

International Journal of Engineering Research in Electronics and Communication Engineering(IJERECE)

Monthly Journal for Electronics and Communication Engineering

Open Access Journal

International Journal of Engineering Research in Electronics and Communication Engineering(IJERECE)

Monthly Journal for Electronics and Communication Engineering

ISSN : 2394-6849 (Online)

Reference :

  1. 1) Alexander O. Tarakanov, Sergei V. Kvachev, Alexander V. Sukhorukov ,” A Formal Immune Network and ItsnImplementation for On-line Intrusion Detection”, Lecture Notes in Computer Science Volume 3685, pp 394-405, 2005

    2) Ranjna Patel, Deepa Bakhshi and Tripti Arjariya,“Random Particle Swarm Optimization (RPSO) based Intrusion Detection System " , International Journal of Advanced Technology and Engineering Exploration (IJATEE), Volume-2, Issue-5, April-2015 ,pp.60-66.

    3) Meng Jianliang,Shang Haikun,Bian Ling,” The Application on Intrusion Detection Based on Kmeans Cluster Algorithm”, International Forum on Information Technology and Applications, 2009.

    4) Lundin, E. and Jonsson, E. “Survey of research in the intrusion detection area”, Technical Report, Department of Computer Engineering, Chalmers University of Technology, Göteborg, Sweden. January 2002.

    5) R.Venkatesan, R. Ganesan, A. Arul Lawrence Selvakumar, " A Comprehensive Study in Data Mining Frameworks for Intrusion Detection " , International Journal of Advanced Computer Research (IJACR), Volume-2, Issue-7, December2012 ,pp.29-34.

    6) S.Devaraju, S.Ramakrishnan:,”Analysis of Intrusion Detection System Using Various Neural Network classifiers, IEEE 2011.

    7) Moriteru Ishida, Hiroki Takakura and Yasuo Okabe,” High-Performance Intrusion Detection Using OptiGrid Clustering and Grid-based Labelling”, IEEE/IPSJ International Symposium on Applications and the Internet, 2011

    8) S. T. Brugger, “Data mining methods for network intrusion detection”,pp. 1-65, 2004.

    9) W. Lee, S. J. Stolfo, “Data Mining Approaches for Intrusion Detection”,Proceedings of the 1998 USENIX Security Symposium, 1998.

    10) Kamini Nalavade, B.B. Meshram, “Mining Association Rules to Evade Network Intrusion in Network Audit Data International Journal of Advanced Computer Research (IJACR), Volume4, Issue-15, June-2014 ,pp.560-567.

    11) W. Lee, S. J. Stolfo, “Data mining approaches for intrusion detection” Proc. of the 7th USENIX Security Symp.. San Antonio, TX, 1998.

    12) Reyadh Naoum, Shatha Aziz, Firas Alabsi, “An Enhancement of the Replacement Steady State Genetic Algorithm for Intrusion Detection”, International Journal of Advanced Computer Research (IJACR), Volume-4, Issue-15, June-2014, pp.487-493.

    13) Aditya Shrivastava, Mukesh Baghel, Hitesh Gupta, " Review of Intrusion Detection Technique by Soft Computing and Data Mining Approach " , International Journal of Advanced Computer Research (IJACR), Volume-3, Issue-12, September-2013 ,pp.224-228.

    14) LI Yin–huan , “Design of Intrusion Detection Model Based on Data Mining Technology”, International Conference on Industrial Control and Electronics Engineering, 2012.

    15) P. Prasenna, R. Krishna Kumar, A.V.T Raghav Ramana and A. Devanbu “Network Programming And Mining Classifier For Intrusion Detection Using Probability Classification”, Pattern Recognition, Informatics and Medical Engineering, March 21-23, 2012.

    16) LI Han, ”Using a Dynamic K-means Algorithm to Detect Anomaly Activities”, Seventh International a. Conference on Computational Intelligence and Security, 2011.


Recent Article