Review: The use of computational intelligence in intrusion detection systems: A review
Citations
1,704 citations
Cites background from "Review: The use of computational in..."
...[6] focus on Computational Intelligence methods and their applications to intrusion detection....
[...]
971 citations
Cites background from "Review: The use of computational in..."
...Methods /NIDSs /Tools Topics covered [8] [10] [11] [6] [16] [17] [3] [7] [21] [26] [29] [31] [32] [33] [34] Our survey...
[...]
...Wu and Banzhaf [29] present an overview of applications of computational intelligence methods to the problem of intrusion detection....
[...]
397 citations
Cites background or methods from "Review: The use of computational in..."
...The instance of the unsupervised learning of the ANN is self-organizing maps (SOM) are single-layer feed forward networks, their outputs can be compressed into a low dimensional grid and they are the most widely used NN for anomaly detection tasks [55]....
[...]
...AIS are computational algorithms that emulate the mechanisms of human immune systems [55]....
[...]
379 citations
374 citations
Cites methods from "Review: The use of computational in..."
...In particular, Swarm Intelligence techniques [66], Markov Chain [67] based ones as well as other soft computing methods [68] seem to possess desirable characteristics in...
[...]
References
35,104 citations
32,573 citations
"Review: The use of computational in..." refers background in this paper
...This survey focuses on Genetic Algorithms (GA) [148] and Genetic Programming (GP) [179]....
[...]
13,487 citations
"Review: The use of computational in..." refers background in this paper
...This survey focuses on Genetic Algorithms (GA) [148] and Genetic Programming (GP) [179]....
[...]
[...]
12,920 citations