메뉴 건너뛰기




Volumn 3, Issue , 2003, Pages 1780-1785

Predicting Intrusions with Local Linear Models

Author keywords

Intrusion Detection Systems; Prediction; Self Organizing Feature Map; Support Vector Machine

Indexed keywords

CLASSIFICATION (OF INFORMATION); CORRELATION DETECTORS; IIR FILTERS; LEARNING ALGORITHMS; REAL TIME SYSTEMS; SIGNAL FILTERING AND PREDICTION; TIME SERIES ANALYSIS;

EID: 0141459790     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (15)

References (18)
  • 1
    • 0033683805 scopus 로고    scopus 로고
    • A computer Host Based User Anomaly Detection System Using the Self Organizing Map
    • Proceedings of the International Joint Conference on Neural Networks
    • A.J. Hoglund, K. Hatonen, A.S. Sorvari, "A computer Host Based User Anomaly Detection System Using the Self Organizing Map", Proceedings of the International Joint Conference on Neural Networks, IEEE IJCNN 2000, Vol. 5, pp 411-416.
    • (2000) IEEE IJCNN 2000 , vol.5 , pp. 411-416
    • Hoglund, A.J.1    Hatonen, K.2    Sorvari, A.S.3
  • 2
    • 0347742772 scopus 로고    scopus 로고
    • Intrusion Detection Systems and Multisensor Data Fusion
    • April
    • T. Bass, "Intrusion Detection Systems and Multisensor Data Fusion", Communications of the ACM, Vol. 43, No. 4, pp 99-105, April, 2000.
    • (2000) Communications of the ACM , vol.43 , Issue.4 , pp. 99-105
    • Bass, T.1
  • 3
    • 0003704318 scopus 로고    scopus 로고
    • Irvine, CA: University of California, Department of Information and Computer Science
    • S. Hettich, S.D. Bay, The UCI KDD Archive, Irvine, CA: University of California, Department of Information and Computer Science, http://kdd.ics.uci.edu, 1999.
    • (1999) The UCI KDD Archive
    • Hettich, S.1    Bay, S.D.2
  • 4
    • 0004181307 scopus 로고
    • Prentice-Hall, ISBN 0-13-212895-0
    • R.W. Hamming, Digital Filters, Prentice-Hall, ISBN 0-13-212895-0, 1989.
    • (1989) Digital Filters
    • Hamming, R.W.1
  • 9
    • 0025399567 scopus 로고
    • Identification and Control of Dynamical Systems using Neural Networks
    • K.S. Narendra, K. Parthasarathy, "Identification and Control of Dynamical Systems using Neural Networks," IEEE Transactions on Neural Networks, 1(1), pp 4-27, 1990.
    • (1990) IEEE Transactions on Neural Networks , vol.1 , Issue.1 , pp. 4-27
    • Narendra, K.S.1    Parthasarathy, K.2
  • 10
    • 0032203424 scopus 로고    scopus 로고
    • Local Dynamic Modelling with Self-Organizing Maps and Applications to Nonlinear System Identification and Control
    • J.C. Principe, L. Wang, Motter M.A., "Local Dynamic Modelling with Self-Organizing Maps and Applications to Nonlinear System Identification and Control," Proceedings of the IEEE, 86(11), pp 2240-2258, 1998.
    • (1998) Proceedings of the IEEE , vol.86 , Issue.11 , pp. 2240-2258
    • Principe, J.C.1    Wang, L.2    Motter, M.A.3
  • 13
    • 0003410791 scopus 로고    scopus 로고
    • Springer-Verlag, ISBN 3-540-67921-9
    • rd Ed., Springer-Verlag, ISBN 3-540-67921-9, 2000.
    • (2000) rd Ed.
    • Kohonen, T.1
  • 15
    • 0006519201 scopus 로고    scopus 로고
    • Helsinki University of Technology, Neural Networks Research Center. Retrieved December
    • J. Vesanto, J. Himberg, E. Alhoniemi, J. Parhankangas, SOM Toolbox for Matlab 5.0, Helsinki University of Technology, Neural Networks Research Center, http://www.cis.hut.fi/projects/somtoolbox/. Retrieved December 2002.
    • (2002) SOM Toolbox for Matlab 5.0
    • Vesanto, J.1    Himberg, J.2    Alhoniemi, E.3    Parhankangas, J.4
  • 17
    • 0141797880 scopus 로고    scopus 로고
    • A Geometric Framework for Unsupervised Anomaly Detection: Detecting Intrusions in Unlabeled Data
    • Chapter 4, D. Barbara and S. Jajodia (editors), Kluwer, ISBN 1-4020-7054-3
    • E. Eskin, A. Arnold, M. Prerau, L. Portnoy, S. Stolfo, "A Geometric Framework for Unsupervised Anomaly Detection: Detecting Intrusions in Unlabeled Data," in Applications of Data Mining in Computer Security, Chapter 4, D. Barbara and S. Jajodia (editors), Kluwer, ISBN 1-4020-7054-3, 2002.
    • (2002) Applications of Data Mining in Computer Security
    • Eskin, E.1    Arnold, A.2    Prerau, M.3    Portnoy, L.4    Stolfo, S.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.