-
1
-
-
85019678573
-
Detecting anomalous and unknown intrusions against programs
-
December. Los Alamitos, CA, USA IEEE Compute. Soc, 1998}
-
A. K. Ghosh, J. Wanken, and F. Charron, "Detecting anomalous and unknown intrusions against programs", Proceedings of the 1998 Annual Computer Security Applications Conference (ACSAC'98), December 1998. Los Alamitos, CA, USA IEEE Compute. Soc, 1998}, pp 259-267
-
(1998)
Proceedings of the 1998 Annual Computer Security Applications Conference (ACSAC'98)
, pp. 259-267
-
-
Ghosh, A.K.1
Wanken, J.2
Charron, F.3
-
3
-
-
0012292276
-
-
October. NIST Gaithersburg, MD. 1990
-
K. L. Fox, R. R. Henning, J. H. Reed, and R. P. Simonian. "A neural network approach towards intrusion detection," October 1990. NIST Gaithersburg, MD. Vol. 1, pp. 125-134, 1990
-
(1990)
A Neural Network Approach Towards Intrusion Detection
, vol.1
, pp. 125-134
-
-
Fox, K.L.1
Henning, R.R.2
Reed, J.H.3
Simonian, R.P.4
-
4
-
-
1542380677
-
Training a neural- neural based intrusion detector to recognize novel attacks
-
West Point, NY
-
Susan C. Lee, David V. Heinbuch, "Training a neural- neural based intrusion detector to recognize novel attacks," Presented at IEEE Workshop Information Assurance and Security, West Point, NY, 2000.
-
(2000)
IEEE Workshop Information Assurance and Security
-
-
Lee, S.C.1
Heinbuch, D.V.2
-
6
-
-
85132011160
-
An application of a recurrent network to an intrusion detection system
-
H. Debar, B. Dorizzi, "An application of a recurrent network to an intrusion detection system," IEEE International Conference on Neural Network Conference, Vol.2, pp. 478-483, 1992
-
(1992)
IEEE International Conference on Neural Network Conference
, vol.2
, pp. 478-483
-
-
Debar, H.1
Dorizzi, B.2
-
7
-
-
85036529638
-
Intrusion detection: Applying machine learning to Solaris audit data
-
Los Alamitos, CA, December
-
D. Endler, "Intrusion detection: Applying machine learning to Solaris audit data," Proceedings of the 1998 annual computer security applications conference, pp 268-279, Los Alamitos, CA, December 1998
-
(1998)
Proceedings of the 1998 Annual Computer Security Applications Conference
, pp. 268-279
-
-
Endler, D.1
-
8
-
-
0141799136
-
Hierarchical and modular neural networks
-
Department of Electrical and Computer Engineering, University of Waterloo
-
Puneet Bakshi, "Hierarchical and modular neural networks," Technical Report. Department of Electrical and Computer Engineering, University of Waterloo.
-
Technical Report
-
-
Bakshi, P.1
-
9
-
-
0141464248
-
HIDE, a hierarchical network intrusion detection system using statistical pre-processing and neural network Classification
-
United States Military Academy, West Point, NY, 5-6, June
-
9] Zheng Zhang, Jun Li, "HIDE, a hierarchical network intrusion detection system using statistical pre-processing and neural network Classification," Proceedings of the 2001 IEEE Workshop on Information Assurance and Security. United States Military Academy, West Point, NY, 5-6, June, 2001
-
(2001)
Proceedings of the 2001 IEEE Workshop on Information Assurance and Security
-
-
Zhang, Z.1
Li, J.2
|