[1]
|
T. Shinohara, “Ubiquitous network vision for new growth,” ITU Telecom Report, 2003.
|
[2]
|
L. Srivastava, “The network of the future: What is over the horizon,” Billing Asia 2006, Shanghai, China, 13 March 2006.
|
[3]
|
Y. Zhang and W. Lee, “An integrated environment for testing mobile ad-hoc networks,” Proceedings of 3rd ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), June 2002.
|
[4]
|
R. Fernandez, “Enterprise dynamic access control (EDA C) case study,” CS1/06-0078 Project, United States Navy, March 2006.
|
[5]
|
National Institute of Standards and Technology-RBAC. http://csrc.nist.gov/rbac/.
|
[6]
|
D. Hammerstrom, “Neural networks at work,” IEEE Spectrum, pp. 26–32, June 1993.
|
[7]
|
Aleksander, et al., “An Introduction to neural computing,” Chapman and Hall, 1990.
|
[8]
|
N. Ye, X. Li, Q. Chen, S. Emran, and M. Xu, “Probabilistic techniques for intrusion detection based on computer audit data,” IEEE Transactions on Systems, Man, and Cybernetics-Part A: Systems and Humans, Vol. 31, No. 4, pp. 266–274, 2001.
|
[9]
|
R. Fuller and M. Kantardzic, “Distributed monitoring of frequent items,” Transactions on Machine Learning and Data Mining, Vol. 1, No. 2, pp. 67–82, 2008.
|
[10]
|
F. Anjum, D. Subhadrabandhu, and S. Sarkar, “Signature based intrusion detection for wireless ad hoc networks: A comparative study of various routing protocols,” IEEE Vehicular Technology Conference, Orlando, FL, Vol. 58, pp. 2152–2156, 6–9 October 2003.
|
[11]
|
A. Mishra, K. Nadkarni, and A. Patcha, “Intrusion detection in wireless ad hoc networks,” IEEE Wireless Communications, pp. 48–60, February 2004.
|
[12]
|
D. Subhadrabandhu, S. Sarkar, and F. Anjum, “Efficacy of misuse detection in ad hoc networks,” Proceedings of the Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, pp. 97–107, 2004.
|
[13]
|
T. Chen and V. Venkataramanan, “Dempster-Shafer theory for intrusion detection in ad hoc networks,” IEEE Internet Computing, pp. 35–41, December 2005.
|
[14]
|
T. Otto, A. Meyer-Baese, M. Hurdal, D. Sumners, D. Auer, and A. Wismuller, “Model-free functional MRI analysis using cluster-based methods,” Proceedings of SPIE, Vol. 5103, pp. 17–24, August 2003.
|
[15]
|
S. Przylucki, W. Wojcik, K. Plachecki, and T. Golec, “An analysis of self-organization process for data classification in multisensor systems,” Proceedings of SPIE, Vol. 5124, pp. 325–332, September 2003.
|
[16]
|
P. D’Urso and L. Giovanni, “Temporal self-organizing maps for telecommunications market segmentation,” Neurocomputing, Vol. 71, pp. 2880–2892, 2008.
|
[17]
|
T. Voegtlin and P. Dominey, “Recursive self-organizing maps,” Neural Networks, Vol. 15, No. 8–9, pp. 979–991, 2002.
|
[18]
|
B. Hammer, A. Micheli, A. Sperduti, and M. Strickert, “Recursive self-organizing network models,” Neural Networks, Vol. 17, No. 8–9, pp. 1061–1085, 2004.
|
[19]
|
Y. Shidara, M. Mineichi Kudo, and A. Nakamura, “Classification based on consistent itemset rules,” Transactions on Machine Learning and Data Mining, Vol. 1, No. 1, pp. 17–30, 2008.
|
[20]
|
A. Fornells, E. Armengol, E. Golobardes, S. Puig, and J. Malvehy, “Experiences using clustering and generalizations for knowledge discovery in melanomas domain,” Transactions on Machine Learning and Data Mining, Vol. 1, No. 2, pp. 49–65, 2008.
|
[21]
|
K. Rosen, “Discrete mathematics and its applications,” 4th Edition, McGraw-Hill Publishers, 2000.
|
[22]
|
V. Krebs, “Introduction to social network analysis,” 15 January 2007. http://www.orgnet.com/sna.html.
|