共 50 条
- [41] Boosting algorithm to improve a voltage waveform classifier based on Artificial Neural Network ARTIFICIAL NEURAL NETWORKS - ICANN 2007, PT 2, PROCEEDINGS, 2007, 4669 : 455 - +
- [42] Identification of Network Intrusion with Efficient Genetic Algorithm Using Bayesian Classifier 2015 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI), 2015,
- [43] Spam detection using hybrid Artificial Neural Network and Genetic Algorithm 2013 13TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS DESIGN AND APPLICATIONS (ISDA), 2013, : 336 - 340
- [44] Network intrusion detection model based on genetic ant colony algorithm PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON AUTOMATION, MECHANICAL CONTROL AND COMPUTATIONAL ENGINEERING, 2015, 124 : 1150 - 1154
- [45] A software implementation of a genetic algorithm based approach to network intrusion detection SIXTH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERNG, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING AND FIRST AICS INTERNATIONAL WORKSHOP ON SELF-ASSEMBLING WIRELESS NETWORKS, PROCEEDINGS, 2005, : 246 - 253
- [46] Genetic algorithm to improve SVM based network intrusion detection system AINA 2005: 19TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 2, 2005, : 155 - 158
- [47] Application of genetic algorithm to artificial neural network Huazhong Ligong Daxue Xuebao/Journal Huazhong (Central China) University of Science and Technology, 1999, 27 (02): : 81 - 83
- [48] Integrated Genetic Algorithm and Artificial Neural Network 2019 22ND IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (IEEE CSE 2019) AND 17TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (IEEE EUC 2019), 2019, : 280 - 282
- [49] Network Intrusion Rules Extraction Based on Rough Set and Niche Genetic Algorithm PROCEEDINGS OF THE INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY, 2008, : 476 - +
- [50] Improved Genetic Algorithm in Intrusion Detection Model Based on Artificial Immune Theory 2009 INTERNATIONAL SYMPOSIUM ON COMPUTER NETWORK AND MULTIMEDIA TECHNOLOGY (CNMT 2009), VOLUMES 1 AND 2, 2009, : 658 - 661