Chebrolu S, Abraham A, Thomas JP, "Feature detection and ensemble design of intrusion detection systems", Compute Security ,2005 View Artical
Chen Y, Abraham A, Yang J, "Feature deduction and intrusion detection using flexible neural trees", Second IEEE International Symposium on Neural Netw ,2005 View Artical
Chen, Z., L. Gao, and K. Kwiat, "Modeling the Spread of Active Worms", Twenty-Second Annual Joint Conference of the IEEE ,2003 View Artical
Chou T-S, Yen KK, "Fuzzy belief k-nearest neighbors anomaly detection of user to root and remote to local attacks ,2007 View Artical
Cohen F, "Computer viruses: theory and experiments ,1987 View Artical
Ghosh AK, Schwartzbard A, "A study in using neural networks for anomaly and misuse detection. View Artical
Ghosh AK, Schwartzbard A, Schatz M, "Learning program behavior profiles for intrusion detection.", In: Workshop on intrusion detection and network mo ,1999 View Artical
Livadas C, Walsh B, Lapsley D, Strayer T, "Using machine learning techniques to identify botnet traffic", In: Second IEEE LCN workshop on network security ( View Artical
Meystel, A.M. & Albus, J.M.,, "Intelligent systems architecture,design, and control", New York,New York, John Wiley & Sons, Inc ,2002 View Artical
Mukkamala S, Janoski G, Sung A, "Designing intrusion detection systems: architectures and perspectives. In: Theinternational engineer", annual review of communications ,Vol.57 ,2004 View Artical
Mukkamala S, Sung A, Abraham A, "Hybrid multi-agent framework for detection of stealthy probes View Artical
Mukkamala S, Sung AH, Abraham A, "Intrusion detection using ensemble of soft computing paradigms", In: Third international conference on intelligent ,2003 View Artical
Mukkamala S, Sung AH, Abraham A, "Modeling intrusion detection systems using linear genetic programming approach", international conference on industrial and enginee ,2004 View Artical
Ourston D, Matzner S, Stump W, Hopkins B, "Coordinated internet attacks: responding to attack complexity ,2004 View Artical
Shah K, Dave N, Chavan S, Mukherjee S, Abraham A, Sanyal S, "Adaptive neuro-fuzzy intrusion detection system ,2004 View Artical
Wang W, Gombault S, Guyet T, "Towards fast detecting intrusions:using key attributes of network traffic ,2008 View Artical
Wang, J., et al, "Internet Worm Early Detection and Response Mechanism", The Journal of China Universities of Posts and Tel ,Vol.14 ,2007 View Artical