-
1
-
-
0003479517
-
-
Morgan Kaufmann Publishers, Inc
-
W. Banzhaf, P. Nordin, R. E. Keller, and F. D. Francone, Genetic Programming: An Introduction on the Automatic Evolution of Computer Programs and its Applications, Morgan Kaufmann Publishers, Inc, 1998.
-
(1998)
Genetic Programming: an Introduction on the Automatic Evolution of Computer Programs and Its Applications
-
-
Banzhaf, W.1
Nordin, P.2
Keller, R.E.3
Francone, F.D.4
-
2
-
-
9444235799
-
Analysis of denial of service attacks using an address resolution protocol attack
-
US Military Academy
-
W. J. Blackert, D. C. Furnanage, and Y. A. Koukoulas, "Analysis of Denial of service attacks Using An address Resolution Protocol Attack", Proc. of the 2002 IEEE Workshop on Information Assurance, US Military Academy, pp. 17-22, 2002.
-
(2002)
Proc. of the 2002 IEEE Workshop on Information Assurance
, pp. 17-22
-
-
Blackert, W.J.1
Furnanage, D.C.2
Koukoulas, Y.A.3
-
3
-
-
0038119011
-
Distributed denial of service characterization
-
Sandia National Laboratories
-
T. Draelos, et. Al, "Distributed Denial of Service Characterization," Technical Report, Sandia National Laboratories, 2003.
-
(2003)
Technical Report
-
-
Draelos, T.1
-
4
-
-
0002432565
-
Multivariate adaptive regression splines
-
J. H. Friedman, "Multivariate Adaptive Regression Splines", Annals of Statistics, Vol 19, pp. 1-141, 1991.
-
(1991)
Annals of Statistics
, vol.19
, pp. 1-141
-
-
Friedman, J.H.1
-
5
-
-
84898276661
-
Requirements for a general framework for response to distributed denial of service
-
D. W. Gresty, Q. Shi, and M. Merabti, "Requirements for a general framework for response to distributed denial of service," Proc. Of Seventeenth Annual Computer Security Applications Conference, pp. 422-229, 2001.
-
(2001)
Proc. of Seventeenth Annual Computer Security Applications Conference
, pp. 422-1229
-
-
Gresty, D.W.1
Shi, Q.2
Merabti, M.3
-
6
-
-
0141465877
-
Making large-scale SVM learning practical
-
University of Dortmund, LS VIII-Report
-
T. Joachims, "Making Large-Scale SVM Learning Practical", LS8-Report, University of Dortmund, LS VIII-Report, 2000.
-
(2000)
LS8-Report
-
-
Joachims, T.1
-
9
-
-
1642283261
-
A taxonomy of DDoS attacks and DDoS defense mechanisms
-
Department of Computer Science, UCLA
-
J. Mirkovic, J. Martin, and P. Reiher, "A Taxonomy of DDoS Attacks and DDoS Defense Mechanisms", Technical Report # 020017, Department of Computer Science, UCLA, 2002.
-
(2002)
Technical Report # 020017
-
-
Mirkovic, J.1
Martin, J.2
Reiher, P.3
-
11
-
-
0242489523
-
Feature selection for intrusion detection using neural networks and support vector machines
-
Transportation Research Record No 1822
-
S. Mukkamala, and A.H. Sung "Feature Selection for Intrusion Detection Using Neural Networks and Support Vector Machines", Journal of the Transportation Research Board of the National Academics, Transportation Research Record No 1822, pp. 33-39, 2003.
-
(2003)
Journal of the Transportation Research Board of the National Academics
, pp. 33-39
-
-
Mukkamala, S.1
Sung, A.H.2
-
12
-
-
9444267133
-
Computational intelligent techniques for detecting denial of service attacks
-
17th International Conference on Industrial and Engineering Applications of Artificial Intelligence and Expert Systems (IEA/AIE), Lecture Notes in Computer Science 3029 Springer, ISBN 3-540-22007-0
-
S. Mukkamala, A. H. Sung, and A. Abraham, "Computational Intelligent Techniques for Detecting Denial of Service Attacks", Proc. of Innovations in Applied Artificial Intelligence, 17th International Conference on Industrial and Engineering Applications of Artificial Intelligence and Expert Systems (IEA/AIE), Lecture Notes in Computer Science 3029 Springer, ISBN 3-540-22007-0, pp. 633-642, 2004.
-
(2004)
Proc. of Innovations in Applied Artificial Intelligence
, pp. 633-642
-
-
Mukkamala, S.1
Sung, A.H.2
Abraham, A.3
-
13
-
-
0034776786
-
On the effectiveness of router-based packet filtering for distributed DoS attack and prevention in power-law internets
-
K. Park, and H. Lee, "On the Effectiveness of Router-Based Packet Filtering for Distributed DoS attack and Prevention in Power-Law Internets", Proc. of the SGICOMM, pp. 15-26, 2001.
-
(2001)
Proc. of the SGICOMM
, pp. 15-26
-
-
Park, K.1
Lee, H.2
-
15
-
-
0004054215
-
-
San Diego, CA: Salford Systems
-
D. Steinberg, P. L. Colla, and K. Martin, MARS User Guide, San Diego, CA: Salford Systems, 1999.
-
(1999)
MARS User Guide
-
-
Steinberg, D.1
Colla, P.L.2
Martin, K.3
-
16
-
-
0038480357
-
Cost-based modeling and evaluation for data mining with application to fraud and intrusion detection
-
J. Stolfo, F. Wei, W. Lee, A. Prodromidis, and P. K. Chan, "Cost-based Modeling and Evaluation for Data Mining with Application to Fraud and Intrusion Detection", Results from the JAM Project by Salvatore, 1999.
-
(1999)
Results from the JAM Project by Salvatore
-
-
Stolfo, J.1
Wei, F.2
Lee, W.3
Prodromidis, A.4
Chan, P.K.5
|