-
1
-
-
0032313923
-
Intrusion detection using sequences of system calls
-
S. A. Hofmeyr, S. Forrest, and A. Somayaji, "Intrusion detection using sequences of system calls," Journal of Computer Security, vol. 6, no. 3, pp. 151-180, 1998.
-
(1998)
Journal of Computer Security
, vol.6
, Issue.3
, pp. 151-180
-
-
Hofmeyr, S.A.1
Forrest, S.2
Somayaji, A.3
-
4
-
-
85132011160
-
An application of a recurrent network to an intrusion detection system
-
H. Debar, B. Dorizzi, "An application of a recurrent network to an intrusion detection system," Proceedings of the 1992 IEEE International Conference on Neural Networks, Vol. 2, pp. 478-483, 1992.
-
(1992)
Proceedings of the 1992 IEEE International Conference on Neural Networks
, vol.2
, pp. 478-483
-
-
Debar, H.1
Dorizzi, B.2
-
5
-
-
84898944587
-
Intrusion detection with neural networks
-
Denver, CO
-
J. Ryan, M. J. Lin, and R. Miikkulainen, "Intrusion detection with neural networks," Proceedings of the 10th Advances in Neural Information Processing Systems Conference, Denver, CO, 1998.
-
(1998)
Proceedings of the 10th Advances in Neural Information Processing Systems Conference
-
-
Ryan, J.1
Lin, M.J.2
Miikkulainen, R.3
-
6
-
-
0141462956
-
Ensemble Learning for Intrusion Detection in Computer Networks
-
Siena, Italy, Sep. 10-13
-
L. Didaci, G. Giacinto, and Fabio Roli, "Ensemble Learning for Intrusion Detection in Computer Networks," Proceedings of VIII Conference of AIIA, Siena, Italy, Sep. 10-13, 2002, http://www-dii.ing.unisi.it/aiia2002/paper/APAUT/didaci-aiia02.pdf
-
(2002)
Proceedings of VIII Conference of AIIA
-
-
Didaci, L.1
Giacinto, G.2
Roli, F.3
-
7
-
-
85084160308
-
A Study in Using Neural Networks for Anomaly and Misuse Detection
-
Washington, D.C., USA, August 23-26
-
A. K. Ghosh and A. Schwartzbard, "A Study in Using Neural Networks for Anomaly and Misuse Detection," Proceedings of the 8th USENIX Security Symposium, Washington, D.C., USA, August 23-26, 1999.
-
(1999)
Proceedings of the 8th USENIX Security Symposium
-
-
Ghosh, A.K.1
Schwartzbard, A.2
-
8
-
-
0036085392
-
Intrusion detection using neural networks and support vector machines
-
S. Mukkamala, G. Janoski, A. Sung, "Intrusion detection using neural networks and support vector machines," in Proceedings of the 2002 International Joint Conference on Neural Networks, 2002, (IJCNN '02), vol. 2, pp. 1702-1707, 2002.
-
(2002)
Proceedings of the 2002 International Joint Conference on Neural Networks, 2002, (IJCNN '02)
, vol.2
, pp. 1702-1707
-
-
Mukkamala, S.1
Janoski, G.2
Sung, A.3
-
10
-
-
0033280865
-
A High-Performance Network Intrusion Detection System
-
Nov. 2-4
-
R. Sekar, Y. Guang, S. Verma, and T. Shanbhag, "A High-Performance Network Intrusion Detection System," in Proceedings of the 6th ACM Conference on Computer and Communications Security, pp. 8-17, Nov. 2-4, 1999.
-
(1999)
Proceedings of the 6th ACM Conference on Computer and Communications Security
, pp. 8-17
-
-
Sekar, R.1
Guang, Y.2
Verma, S.3
Shanbhag, T.4
-
11
-
-
0035402096
-
Training a neural-network based intrusion detector to recognize novel attacks
-
S. C. Lee and D. V. Heinbuch, "Training a neural-network based intrusion detector to recognize novel attacks," Part A, IEEE Transactions on Systems, Man and Cybernetics, Vol. 31-4, pp. 294-299, 2001.
-
(2001)
Part A, IEEE Transactions on Systems, Man and Cybernetics
, vol.31
, Issue.4
, pp. 294-299
-
-
Lee, S.C.1
Heinbuch, D.V.2
-
13
-
-
85036529638
-
Intrusion detection: Applying machine learning to Solaris audit data
-
Los Alamitos, CA, December
-
D. Endler, "Intrusion detection: Applying machine learning to Solaris audit data," Proceedings of the 1998 Annual Computer Security Applications Conference (ACSAC'98), pp. 268-279, Los Alamitos, CA, December 1998.
-
(1998)
Proceedings of the 1998 Annual Computer Security Applications Conference (ACSAC'98)
, pp. 268-279
-
-
Endler, D.1
-
14
-
-
0141574585
-
-
SANS
-
R. K. Cunningham, R. P. Lippmann, D. J. Fried, S. L. Garfinkle, I. Graf, K. R. Kendall, S. E. Webster, D. Wyschogrod, M. A. Zissman, "Evaluating Intrusion Detection Systems without Attacking your Friends: The 1998 DARPA Intrusion Detection Evaluation", SANS 1999.
-
(1999)
Evaluating Intrusion Detection Systems without Attacking your Friends: The 1998 DARPA Intrusion Detection Evaluation
-
-
Cunningham, R.K.1
Lippmann, R.P.2
Fried, D.J.3
Garfinkle, S.L.4
Graf, I.5
Kendall, K.R.6
Webster, S.E.7
Wyschogrod, D.8
Zissman, M.A.9
-
18
-
-
0003413187
-
-
Upper Saddle River: Prentice Hall
-
nd ed., Upper Saddle River: Prentice Hall, 1999, pp. 256-317.
-
(1999)
nd Ed.
, pp. 256-317
-
-
Haykin, S.1
-
19
-
-
0003396255
-
-
The Math Works, Inc., Natick, MA
-
H. Demuth, M. Beale, Neural Network Toolbox User's Guide, ver. 4, release 13, The Math Works, Inc., Natick, MA, 2002, p. 7-7.
-
(2002)
Neural Network Toolbox User's Guide, Ver. 4, Release 13
, pp. 7
-
-
Demuth, H.1
Beale, M.2
|