-
1
-
-
0003516333
-
Intrusion detection systems: A survey and taxonomy
-
Department of Computer Engineering, Chalmers University of Technology, Göteborg
-
S. Axelsson, "Intrusion detection systems: A survey and taxonomy," Department of Computer Engineering, Chalmers University of Technology, Göteborg," Tech. Rep. 99-15, 2000.
-
(2000)
Tech. Rep.
, vol.99
, Issue.15
-
-
Axelsson, S.1
-
2
-
-
84966620150
-
Testing and evaluating computer intrusion detection systems
-
R. Durst, T. Champion, B. Witten, E. Miller, and L. Spagnuolo, "Testing and evaluating computer intrusion detection systems," Communications of the ACM, vol. 42, pp. 53-61, 1999.
-
(1999)
Communications of the ACM
, vol.42
, pp. 53-61
-
-
Durst, R.1
Champion, T.2
Witten, B.3
Miller, E.4
Spagnuolo, L.5
-
3
-
-
84962260018
-
Evaluating intrusion detection systems: The 1998 DARPA off-line intrusion detection evaluation
-
Hilton Head, IEEE Press
-
R. P. Lippmann, D. J. Fried, I. Graf, J. W. Haines, K. R. Kendall, D. McClung, D. Weber, S. E Webster, D. Wyschogrod, R. K. Cunningham, and M. A. Zissman, "Evaluating intrusion detection systems: the 1998 DARPA off-line intrusion detection evaluation," in Proc. of the 2000 DARPA Information Survivability Conf. and Exposition (DISCEX), Hilton Head, vol. 2. IEEE Press, 2000, pp. 12-26.
-
(2000)
Proc. of the 2000 DARPA Information Survivability Conf. and Exposition (DISCEX)
, vol.2
, pp. 12-26
-
-
Lippmann, R.P.1
Fried, D.J.2
Graf, I.3
Haines, J.W.4
Kendall, K.R.5
McClung, D.6
Weber, D.7
Webster, S.E.8
Wyschogrod, D.9
Cunningham, R.K.10
Zissman, M.A.11
-
4
-
-
27144507060
-
Intrusion detection in computer networks with neural and fuzzy classifiers
-
Istanbul, ser. Lecture Notes in Computer Science, no. 2714. Springer Verlag Berlin Heidelberg New York
-
A. Hofmann, C. Schmilz, and B. Sick, "Intrusion detection in computer networks with neural and fuzzy classifiers," in Artificial Neural Networks and Neural Information Processing - ICANN/ICONIP 2003 (Joint International Conference ICANN/ICONIP 2003) Istanbul, ser. Lecture Notes in Computer Science, no. 2714. Springer Verlag Berlin Heidelberg New York, 2003, pp. 316-324.
-
(2003)
Artificial Neural Networks and Neural Information Processing - ICANN/ICONIP 2003 (Joint International Conference ICANN/ICONIP 2003)
, pp. 316-324
-
-
Hofmann, A.1
Schmilz, C.2
Sick, B.3
-
5
-
-
0034300835
-
Improving intrusion detection performance using keyword selection and neural networks
-
R. P. Lippmann and R. K. Cunningham, "Improving intrusion detection performance using keyword selection and neural networks," Computer Networks, vol. 34, no. 4, pp. 597-603, 2000.
-
(2000)
Computer Networks
, vol.34
, Issue.4
, pp. 597-603
-
-
Lippmann, R.P.1
Cunningham, R.K.2
-
6
-
-
0036082885
-
A comparison of input representations in neural networks: A case study in intrusion detection
-
Honolulu
-
Z. Liu, G. Florez, and S. M. Bridges, "A comparison of input representations in neural networks: a case study in intrusion detection," in Proc. of the Int. Joint Conf. on Neural Networks (IJCNN 2002), Honolulu, vol. 2, 2002, pp. 1708-1713.
-
(2002)
Proc. of the Int. Joint Conf. on Neural Networks (IJCNN 2002)
, vol.2
, pp. 1708-1713
-
-
Liu, Z.1
Florez, G.2
Bridges, S.M.3
-
7
-
-
0036085392
-
Intrusion detection using neural networks and support vector machines
-
Honolulu
-
S. Mukkamala, G. Janoski, and A. Sung, "Intrusion detection using neural networks and support vector machines," in Proc. of the Int. Joint Conf. on Neural Networks (IJCNN 2002), Honolulu, vol. 2, 2002, pp. 1702-1707.
-
(2002)
Proc. of the Int. Joint Conf. on Neural Networks (IJCNN 2002)
, vol.2
, pp. 1702-1707
-
-
Mukkamala, S.1
Janoski, G.2
Sung, A.3
-
8
-
-
85132011160
-
An application of a recurrent network to an intrusion detection
-
Baltimore
-
H. Debar and B. Dorizzi, "An application of a recurrent network to an intrusion detection," in Proc. of the Int. Joint Conf. on Neural Networks (IJCNN 1992), Baltimore, vol. 2, 1992, pp. 478-483.
-
(1992)
Proc. of the Int. Joint Conf. on Neural Networks (IJCNN 1992)
, vol.2
, pp. 478-483
-
-
Debar, H.1
Dorizzi, B.2
-
10
-
-
34848894054
-
The application of fuzzy ARTMAP in the detection of computer network attacks
-
Vienna, ser. LNCS 2130, G. Dorffner, H. Bischof, and K. Hornik, Eds. Springer-Verlag, Berlin, Heidelberg, New York
-
J. Cannady and R. C. Garcia, "The application of fuzzy ARTMAP in the detection of computer network attacks," in Artificial Neural Networks -ICANN 2001 (Proc. of the 11th Int. Conf. on Artificial Neural Networks), Vienna, ser. LNCS 2130, G. Dorffner, H. Bischof, and K. Hornik, Eds. Springer-Verlag, Berlin, Heidelberg, New York, 2001, pp. 225-230.
-
(2001)
Artificial Neural Networks -ICANN 2001 (Proc. of the 11th Int. Conf. on Artificial Neural Networks)
, pp. 225-230
-
-
Cannady, J.1
Garcia, R.C.2
-
11
-
-
0033683805
-
A computer host-based user anomaly detection system using the self-organizing map
-
Como
-
A. J. Hoglund, K. Hatonen, and A. S. Sorvari, "A computer host-based user anomaly detection system using the self-organizing map," in Proc. of the IEEE-INNS-ENNS Int. Joint Conf. on Neural Networks (IJCNN 2000), Como, vol. 5, 2000, pp. 411-416.
-
(2000)
Proc. of the IEEE-INNS-ENNS Int. Joint Conf. on Neural Networks (IJCNN 2000)
, vol.5
, pp. 411-416
-
-
Hoglund, A.J.1
Hatonen, K.2
Sorvari, A.S.3
-
13
-
-
84964461159
-
Mobile security agents for network traffic analysis
-
Anaheim
-
D. Dasgupta and H. Brian, "Mobile security agents for network traffic analysis," in Proc. of DARPA Information Survivability Conference & Exposition II (DISCEX '01), Anaheim, vol. 2, 2001, pp. 332-340.
-
(2001)
Proc. of DARPA Information Survivability Conference & Exposition II (DISCEX '01)
, vol.2
, pp. 332-340
-
-
Dasgupta, D.1
Brian, H.2
-
15
-
-
0003602164
-
-
Kluwer Academic Publishers, Boston
-
H. Liu and H. Motoda, Eds., Feature Extraction, Construction, and Selection: A Data Mining Perspective. Kluwer Academic Publishers, Boston, 1998.
-
(1998)
Feature Extraction, Construction, and Selection: A Data Mining Perspective
-
-
Liu, H.1
Motoda, H.2
-
16
-
-
84898944587
-
Intrusion detection with neural networks
-
M. Jordan, M. Kearns, and S. Solla, Eds. MIT Press, Cambridge
-
J. Ryan, M.-J. Lin, and R. Miikkulainen, "Intrusion detection with neural networks," in Advances in Neural Information Processing Systems 10 (NIPS '97), M. Jordan, M. Kearns, and S. Solla, Eds. MIT Press, Cambridge, 1998, pp. 943-949.
-
(1998)
Advances in Neural Information Processing Systems 10 (NIPS '97)
, pp. 943-949
-
-
Ryan, J.1
Lin, M.-J.2
Miikkulainen, R.3
-
17
-
-
85036529638
-
Intrusion detection applying machine learning to Solaris audit data
-
Scottsdale, AZ: IEEE Computer Society Press
-
D. Endler, "Intrusion detection applying machine learning to Solaris audit data," in Proc. of the 1998 Annual Computer Security Applications Conference (ACSAC'98). Scottsdale, AZ: IEEE Computer Society Press, 1998, pp. 268-279.
-
(1998)
Proc. of the 1998 Annual Computer Security Applications Conference (ACSAC'98)
, pp. 268-279
-
-
Endler, D.1
-
18
-
-
0003200953
-
Artificial intelligence and intrusion detection: Current and future directions
-
Baltimore, MD
-
J. Frank, "Artificial intelligence and intrusion detection: Current and future directions," in Proceedings of the 17th National Computer Security Conference, Baltimore, MD, 1994.
-
(1994)
Proceedings of the 17th National Computer Security Conference
-
-
Frank, J.1
-
19
-
-
84943383590
-
Identifying important features for intrusion detection using support vector machines and neural networks
-
Orlando, Florida: IEEE Computer Society
-
S. Mukkamala and A. H. Sung, "Identifying important features for intrusion detection using support vector machines and neural networks," in 2003 Symposium on Applications and the Internet. Orlando, Florida: IEEE Computer Society, 2003, pp. 209-216.
-
(2003)
2003 Symposium on Applications and the Internet
, pp. 209-216
-
-
Mukkamala, S.1
Sung, A.H.2
-
20
-
-
0037083574
-
Automated discovery of concise predictive rules for intrusion detection
-
G. Helmer, J. S. K. Wong, V. Honavar, and L. Miller, "Automated discovery of concise predictive rules for intrusion detection," The Journal of Systems and Software, vol. 60, no. 3, pp. 165-175, 2002.
-
(2002)
The Journal of Systems and Software
, vol.60
, Issue.3
, pp. 165-175
-
-
Helmer, G.1
Wong, J.S.K.2
Honavar, V.3
Miller, L.4
-
23
-
-
34250726963
-
Fast and efficient training of RBF networks
-
Istanbul, ser. Lecture Notes in Computer Science, no. 2714. Springer Verlag Berlin Heidelberg New York
-
O. Buchtala, A. Hofmann, and B. Sick, "Fast and efficient training of RBF networks," in Artificial Neural Networks and Neural Information Processing - ICANN/ICONIP 2003 (Joint International Conference ICANN/ICONIP 2003) Istanbul, ser. Lecture Notes in Computer Science, no. 2714. Springer Verlag Berlin Heidelberg New York, 2003, pp. 43 -51.
-
(2003)
Artificial Neural Networks and Neural Information Processing - ICANN/ICONIP 2003 (Joint International Conference ICANN/ICONIP 2003)
, pp. 43-51
-
-
Buchtala, O.1
Hofmann, A.2
Sick, B.3
-
25
-
-
0003428414
-
-
1st ed. Addison Wesley Longman
-
W. R. Stevens, TCP/IP Illustrated, Volume 1, 1st ed. Addison Wesley Longman, 1998.
-
(1998)
TCP/IP Illustrated
, vol.1
-
-
Stevens, W.R.1
|