-
2
-
-
0036588773
-
Incorporating soft computing techniques into a probabilistic intrusion detection system
-
May
-
S.B. Cho, "Incorporating soft computing techniques into a probabilistic intrusion detection system," IEEE Trans. Systems, Man, and Cybernetics - Part C, vol. 32, pp. 154-160, May 2002.
-
(2002)
IEEE Trans. Systems, Man, and Cybernetics - Part C
, vol.32
, pp. 154-160
-
-
Cho, S.B.1
-
5
-
-
0003907293
-
-
Macmillan Technical Publishing
-
R.G. Bace, Intrusion Detection, Macmillan Technical Publishing, 2000.
-
(2000)
Intrusion Detection
-
-
Bace, R.G.1
-
6
-
-
0037105910
-
Intrusion detection techniques and approaches
-
T. Verwoerd, and R. Hunt, "Intrusion detection techniques and approaches," Computer Communications, vol. 25, pp. 1356-1365, 2002.
-
(2002)
Computer Communications
, vol.25
, pp. 1356-1365
-
-
Verwoerd, T.1
Hunt, R.2
-
7
-
-
0037411435
-
The neural network models for IDS based on the asymmetric costs of false negative errors and false positive errors
-
D. Joo, T. Hong and I. Han, "The neural network models for IDS based on the asymmetric costs of false negative errors and false positive errors," Expert Systems with Applications, vol. 25, pp. 69-75, 2003.
-
(2003)
Expert Systems with Applications
, vol.25
, pp. 69-75
-
-
Joo, D.1
Hong, T.2
Han, I.3
-
8
-
-
0034300797
-
Anomaly-based intrusion detection: Privacy concerns and other problems
-
E. Lundin, and E. Jonsson, "Anomaly-based intrusion detection: privacy concerns and other problems," Computer Networks, vol. 34, pp. 623-640, 2000.
-
(2000)
Computer Networks
, vol.34
, pp. 623-640
-
-
Lundin, E.1
Jonsson, E.2
-
9
-
-
0035879674
-
Intrusion detection through learning behavior model
-
B. Balajinath, and S.V. Raghavan, "Intrusion detection through learning behavior model," Computer Communications, vol. 24, pp. 1202-1212, 2001.
-
(2001)
Computer Communications
, vol.24
, pp. 1202-1212
-
-
Balajinath, B.1
Raghavan, S.V.2
-
10
-
-
10044285459
-
Security is fuzzy! Applying the fuzzy logic paradigm to the multipolicy paradigm
-
Aug.
-
H.H. Hosmer, "Security is fuzzy! Applying the fuzzy logic paradigm to the multipolicy paradigm," Proceedings ACM Symposium on New Security Paradigms, pp.44-49, Aug. 1993.
-
(1993)
Proceedings ACM Symposium on New Security Paradigms
, pp. 44-49
-
-
Hosmer, H.H.1
-
13
-
-
0035792373
-
Fuzzy intrusion detection
-
July
-
J.E. Dickerson, J. Juslin, O. Koukousoula, and J.A. Dickerson, "Fuzzy intrusion detection," Proceedings IFSA World Congress and 20th NAFIPS International Conference, vol. 3, pp. 1506-1510 July 2001.
-
(2001)
Proceedings IFSA World Congress and 20th NAFIPS International Conference
, vol.3
, pp. 1506-1510
-
-
Dickerson, J.E.1
Juslin, J.2
Koukousoula, O.3
Dickerson, J.A.4
-
14
-
-
84964461159
-
Mobile security agents for network traffic analysis
-
D. Dasgupta, and H. Brian, "Mobile security agents for network traffic analysis," Proceedings DARPA Information Survivability Conference DISCEX '01, vol. 2, pp. 332-340, 2001.
-
(2001)
Proceedings DARPA Information Survivability Conference DISCEX '01
, vol.2
, pp. 332-340
-
-
Dasgupta, D.1
Brian, H.2
-
15
-
-
0036925641
-
A fuzzy comprehensive evaluation based distributed intrusion detection
-
China, Beijing
-
M.G. Ouyang, W.N. Wang and Y.T. Zhang, "A fuzzy comprehensive evaluation based distributed intrusion detection," Proceedings First International Conference on Machine Learning and Cybernetics, China, Beijing, pp. 281-285, 2002.
-
(2002)
Proceedings First International Conference on Machine Learning and Cybernetics
, pp. 281-285
-
-
Ouyang, M.G.1
Wang, W.N.2
Zhang, Y.T.3
-
16
-
-
33644961664
-
DARPA intrusion detection evaluation: Design and procedures
-
MIT Lincoln Laboratory, 7999 Feb.
-
MIT Lincoln Laboratory, 7999 DARPA intrusion detection evaluation: design and procedures, DARPA Technical Report 1062, Feb. 2001.
-
(2001)
DARPA Technical Report
, vol.1062
-
-
-
17
-
-
0026943536
-
Generating fuzzy rules by learning from examples
-
Sept.
-
L.X. Wang and J. Mendel, "Generating fuzzy rules by learning from examples," IEEE Transactions on Systems, Man and Cybernetics, vol. 22, pp.1414-1427, Sept. 1992.
-
(1992)
IEEE Transactions on Systems, Man and Cybernetics
, vol.22
, pp. 1414-1427
-
-
Wang, L.X.1
Mendel, J.2
-
18
-
-
0029242750
-
A method for fuzzy rules extraction directly from numerical data and its application to pattern classification
-
Jan.
-
Sh. Abe and M. Lan, "A method for fuzzy rules extraction directly from numerical data and its application to pattern classification," IEEE Transaction on Fuzzy Systems, vol. 3, pp.18-28, Jan. 1995.
-
(1995)
IEEE Transaction on Fuzzy Systems
, vol.3
, pp. 18-28
-
-
Abe, Sh.1
Lan, M.2
-
19
-
-
0030699894
-
Method for fuzzy rules extraction from numerical data
-
Turkey, Istanbul, July
-
th IEEE International Symposium on Intelligent Control, Turkey, Istanbul, pp. 61-54, July1997.
-
(1997)
th IEEE International Symposium on Intelligent Control
, pp. 61-154
-
-
Mikhailov, L.1
Nabout, A.2
Lekova, A.3
Fischer, F.4
Eldin, H.A.N.5
-
21
-
-
84885774862
-
A framework for constructing features and models for intrusion detection systems
-
W. Lee and S.J. Stolfo, "A framework for constructing features and models for intrusion detection systems," ACM Transactions on Information and System Security, vol. 3, pp. 227-261, 2000.
-
(2000)
ACM Transactions on Information and System Security
, vol.3
, pp. 227-261
-
-
Lee, W.1
Stolfo, S.J.2
|