-
1
-
-
84885774862
-
A framework for constructing features and models for intrusion detection systems
-
Lee W, Stolfo S.J. A framework for constructing features and models for intrusion detection systems. ACM Transactions on Information and System Security, 2000, Vol. 3, No. 4:227-261.
-
(2000)
ACM Transactions on Information and System Security
, vol.3
, Issue.4
, pp. 227-261
-
-
Lee, W.1
Stolfo, S.J.2
-
2
-
-
0029267472
-
State transition analysis: A rule-based intrusion detection approach
-
Ilgun K, Kemmerer R.A, and Porras P.A. State transition analysis: A rule-based intrusion detection approach. IEEE Trans. Soft. Eng. 1995. 21(3):181-199.
-
(1995)
IEEE Trans. Soft. Eng.
, vol.21
, Issue.3
, pp. 181-199
-
-
Ilgun, K.1
Kemmerer, R.A.2
Porras, P.A.3
-
4
-
-
0004118981
-
The NIDES statistical component: Description and justification
-
Computer Science Laboratory
-
Javits H.S, Valdes A. The NIDES statistical component: Description and justification. Technical Rep. SRI International, Computer Science Laboratory, 1993.
-
(1993)
Technical Rep. SRI International
-
-
Javits, H.S.1
Valdes, A.2
-
5
-
-
0002629036
-
EMERALD: Event monitoring enabling response to anomalous live disturbances
-
National Institute of Standards and Technology, Galthersburg MD
-
Porras P.A, Neumann P.O. EMERALD: Event monitoring enabling response to anomalous live disturbances. In Proceedings of the 20th National Information Systems Security Conference, National Institute of Standards and Technology, Galthersburg, MD, 1997.
-
(1997)
Proceedings of the 20th National Information Systems Security Conference
-
-
Porras, P.A.1
Neumann, P.O.2
-
6
-
-
85017067350
-
Real-time protocol analysis for detecting link-state routing protocol
-
Chang H, Wu S.F, and Jou Y.F. Real-time protocol analysis for detecting link-state routing protocol. ACM Trans. Inf. Syst. Secu, 2001, 4(1):1-36.
-
(2001)
ACM Trans. Inf. Syst. Secu
, vol.4
, Issue.1
, pp. 1-36
-
-
Chang, H.1
Wu, S.F.2
Jou, Y.F.3
-
10
-
-
0037411435
-
The neural network models for IDS based on the asymmetric costs of false negative errors and false positive errors
-
Joo D, Hong T, and Han I. The neural network models for IDS based on the asymmetric costs of false negative errors and false positive errors. Expert Systems with Applications, 2003, 25(1):69-75.
-
(2003)
Expert Systems with Applications
, vol.25
, Issue.1
, pp. 69-75
-
-
Joo, D.1
Hong, T.2
Han, I.3
-
11
-
-
0025235219
-
ART3:Hierarchical search using chemical transmitters in self-organizing pattern recognition architectures
-
Carpenter G.A, Grossberg S. ART3:Hierarchical search using chemical transmitters in self-organizing pattern recognition architectures. Neural Networks, 1990, 3(23):129-152.
-
(1990)
Neural Networks
, vol.3
, Issue.23
, pp. 129-152
-
-
Carpenter, G.A.1
Grossberg, S.2
-
12
-
-
0141794883
-
Generalized hamming distance
-
Bookstein A, Kulyukin V.A, and Raita T. Generalized hamming distance. Information Retrieval, 2002, 5(4):353-375.
-
(2002)
Information Retrieval
, vol.5
, Issue.4
, pp. 353-375
-
-
Bookstein, A.1
Kulyukin, V.A.2
Raita, T.3
|