@incollection{, B35B5E49DCB0D7CB4DAE9AFBD2EBFE43 , author={{Dr. AminEinipour} and {Department of Computer, Andimeshk Branch, Islamic Azad University, Andimeshk, Iran.}}, journal={{Global Journal of Computer Science and Technology}}, journal={{GJCST}}0975-41720975-435010.34257/gjcst, address={Cambridge, United States}, publisher={Global Journals Organisation}12111929 } @book{b0, , title={{The architecture of network level intrusion detection system?}} , author={{ GHeady } and { ALuger } and { MMaccabe } and { Servilla }} , year={1990} Department of Computer Science, University of New Mexico , note={Report} } @incollection{b1, , title={{Defending Yourself: The Role of Intrusion Detection Systems?}} , author={{ JMchugh } and { AChristie } and { JAllen }} , journal={{IEEE Software}} , year={Sept./Oct. 2000} } @book{b2, , title={{The Practical Intrusion Detection Handbook}} , author={{ PEProctor }} , year={2001} , publisher={Prentice Hall} } @incollection{b3, , title={{Methods for combining multiple classifiers and their applications to handwriting recognition}} , author={{ LXu } and { AKrzyzak } and { CYSuen }} , journal={{IEEE Trans. Systems, Man and Cybernetics}} 22 , year={1992} } @book{b4, , title={{Detecting unusual program behavior using the statistical component of the next-generation intrusion detection expert system (NIDES)}} , author={{ DAnderson } and { TFLunt } and { HJavitz } and { ATamaru } and { AValdes }} , address={Menlo Park, CA, USA} Computer Science Laboratory , note={SRI International; 1995. SRIO-CSL-95-06} } @incollection{b5, , title={{A Study in Using Neural Networks for Anomaly and Misuse Detection}} , author={{ AKGhosh } and { ASchwartzbard }} , booktitle={{Proc. of the USENIX Security Symposium}} of the USENIX Security SymposiumWashington, USA , year={August 23-26, 1999} } @incollection{b6, , title={{An adaptive neural network approach to intrusion detection and response?}} , author={{ JCannady }} , journal={{School of Comp. and Inf. Sci}} , year={2000} Nova Southeastern University , note={PhD Thesis} } @incollection{b7, , title={{Neural Networks applied in intrusion detection systems?}} , author={{ JMBonifacio }} , booktitle={{Proc. of the IEEE World congress on Comp. Intell. (WCCI ?98)}} of the IEEE World congress on Comp. Intell. (WCCI ?98) , year={1998} } @incollection{b8, , title={{A Hybridization of Evolutionary Fuzzy Systems and Ant Colony Optimization for Intrusion Detection}} , author={{ JafarMohammad Saniee Abadeh } and { Habibi }} , journal={{INTERNATIONAL JOURNAL OF INFORMATION SECURITY}} 2 1 , year={2010} } @incollection{b9, , title={{A Parallel Genetic Local Search Algorithm for Intrusion Detection in Computer Networks}} , author={{ Mohammad } and { JafarMohammad Saniee Abadeh } and { ZeynabHabibi } and { MunaBarzegar } and { Sergi }} , journal={{ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE}} 12 20 , year={2007} } @incollection{b10, , title={{Computer Security Threat Monitoring and Surveillance}} , author={{ JPAnderson }} , journal={{J.P. Anderson Company}} , year={April, 1980} , note={Technical Report} } @incollection{b11, , title={{An Intrusion-Detection Model}} , author={{ DorothyDenning }} , journal={{IEEE Transactions on Software Engineering}} 13 2 , year={February, 1987} } @incollection{b12, , title={{Automated Audit Trail Analysis and Intrusion Detection: A Survey}} , author={{ TFLunt }} , booktitle={{Proceedings of the 11th National Computer Security Conference}} the 11th National Computer Security Conference , year={1990} } @incollection{b13, , title={{A detailed analysis of the KDD CUP 99 data set}} , author={{ MahbodTavallaee } and { EbrahimBagheri } and { WeiLu } and { AliAGhorbani }} , booktitle={{Proceedings of the Second IEEE international conference on Computational intelligence for security and defense applications}} the Second IEEE international conference on Computational intelligence for security and defense applicationsOttawa, Ontario, Canada , year={2009} } @book{b14, , title={{Distributed representation of fuzzy rules and its application to pattern classification? , Fuzzy Sets and Systems}} , author={{ HIshibuchi } and { KNozaki } and { HTanaka }} , year={1992} 52 } @incollection{b15, , title={{Particle swarm optimization}} , author={{ JKennedy } and { REberhart }} , booktitle={{IEEE International Conference on Neural Networks}} , publisher={IEEE Press} , year={1995} } @book{b16, , title={{Amin Einipour -A Fuzzy-ACO Method for Detect Breast Cancer? Global Journal of Health Science}} , year={October 2011} } @incollection{b17, , title={{Swarm Intelligence for Rule Discovery in Data Mining}} , author={{ AndreBDe Carvalho } and { TaylorSavegnago } and { AuroraPozo }} , booktitle={{ICEIS 2010}} Funchal, Madeira, Portugal , year={June 8 -12, 2010} 2 } @book{b18, , title={{Fuzzy Sets, Neural Networks, and Soft Computing}} , author={{ RRYager } and { LAZadeh }} , year={1994} , publisher={Van Nostrand Reinhold} , address={New York} } @book{b19, , title={{Essentials of Fuzzy Modeling and Control}} , author={{ RRYager } and { DPFilev }} , year={1994} , publisher={Wiley} } @incollection{b20, , title={{Neuro-fuzzy modeling and control. Proceedings}} , author={{ J-S RJang } and { C-TSun }} , journal={{IEEE}} 83 3 , year={1995} } @incollection{b21, , title={{Fuzzy inference neural network for fuzzy model tuning}} , author={{ K-MLee } and { D-HKwak } and { HLee-Kwang }} , journal={{IEEE Trans Syst Man Cybern}} 26 4 , year={1996} } @incollection{b22, , title={{Reinforcement structure: parameter learning for neural-network-based fuzzy logic control systems}} , author={{ C-TLin } and { CsgLee }} , journal={{IEEE Trans Fuzzy Syst}} 2 1 , year={1994} } @incollection{b23, , title={{Fuzzy system design with a cascaded genetic algorithm}} , author={{ HHeider } and { TDrabe }} , booktitle={{Proceedings of}} null , year={1997} } @incollection{b24, , title={{}} , journal={{IEEE}} , year={1997} , publisher={Evolutionary Programming Society} } @incollection{b25, , title={{A study on fuzzy rules discovery using pseudobacterial genetic algorithm with adaptive operator}} , author={{ NENawa } and { THashiyama } and { TFuruhashi } and { YUchikawa }} , booktitle={{Proceedings of 1997 IEEE International Conference on Evolutionary Computation. IEEE and IEEE Neural Network Council and Evolutionary Programming Society}} 1997 IEEE International Conference on Evolutionary Computation. IEEE and IEEE Neural Network Council and Evolutionary Programming Society , year={1997} }