-
2
-
-
0345389037
-
Data mining for network intrusion detection: How to get started
-
The MITRE Corporation, August 2001
-
Bloedorn, E., Christiansen, A. D., Hill, W., Skorupka C., Talbot, L. M., and Tivel, J. (2001). "Data Mining for Network Intrusion Detection: How to Get Started", available at: www.mitre.org/support/papers/archive01.shtml, The MITRE Corporation, August 2001.
-
(2001)
-
-
Bloedorn, E.1
Christiansen, A.D.2
Hill, W.3
Skorupka, C.4
Talbot, L.M.5
Tivel, J.6
-
3
-
-
0000231655
-
Artificial neural networks for misuse detection
-
October 5-8 1998, Arlington, VA
-
Cannady, J. (1998). "Artificial Neural Networks for Misuse Detection", Proceedings of the 1998 National Information Systems Security Conference (NISSC'98), pp. 443-456, October 5-8 1998, Arlington, VA.
-
(1998)
Proceedings of the 1998 National Information Systems Security Conference (NISSC'98)
, pp. 443-456
-
-
Cannady, J.1
-
5
-
-
0002511642
-
An overview of artificial immune systems and their applications
-
D. Dasgupta, ed.; Springer
-
Dasgupta, D. (1999). "An Overview of Artificial Immune Systems and Their Applications", Artificial Immune Systems and Their Applications, D. Dasgupta, ed., pp. 3-21, Springer.
-
(1999)
Artificial Immune Systems and Their Applications
, pp. 3-21
-
-
Dasgupta, D.1
-
6
-
-
0036613083
-
An immunity-based technique to characterize intrusions in computer networks
-
IEEE Press
-
Dasgupta, D. and Gonzalez, F. (2002)., "An Immunity-Based Technique to Characterize Intrusions in Computer Networks", IEEE Transactions on Evolutionary Computation, Vol. 6, No. 3, pp. 281-291. IEEE Press.
-
(2002)
IEEE Transactions on Evolutionary Computation
, vol.6
, Issue.3
, pp. 281-291
-
-
Dasgupta, D.1
Gonzalez, F.2
-
7
-
-
0000308566
-
Real-coded genetic algorithms and interval-schemata
-
L. Darrell Whitley, ed.; Morgan Kaufmann
-
Eshelman, L. and Schaffer, J. D. (1992). "Real-Coded Genetic Algorithms and Interval-Schemata", Proceedings of the 1992 Foundations of Genetic Algorithms (FOGA-2), L. Darrell Whitley, ed., pp. 187-202, Morgan Kaufmann.
-
(1992)
Proceedings of the 1992 Foundations of Genetic Algorithms (FOGA-2)
, pp. 187-202
-
-
Eshelman, L.1
Schaffer, J.D.2
-
9
-
-
0002819121
-
A comparative analysis of selection schemes used in genetic algorithms
-
Gregory J. E. Rawlins, ed.; Morgan Kaufmann Publishers
-
Goldberg, D. E. and Deb, K. (1989). "A Comparative Analysis of Selection Schemes Used in Genetic Algorithms", Foundations of Genetic Algorithms (1989), Gregory J. E. Rawlins, ed., pp. 69-93, Morgan Kaufmann Publishers.
-
(1989)
Foundations of Genetic Algorithms (1989)
, pp. 69-93
-
-
Goldberg, D.E.1
Deb, K.2
-
10
-
-
0003496659
-
An immunological model of distributed detection and its application to computer security
-
Ph.D. Dissertation, Department of Computer Science, The University of New Mexico
-
Hofmeyr, S. (1999). An Immunological Model of Distributed Detection and Its Application to Computer Security, Ph.D. Dissertation, Department of Computer Science, The University of New Mexico.
-
(1999)
-
-
Hofmeyr, S.1
-
11
-
-
0002320533
-
Immunity by design: An artificial immune system
-
Morgan-Kaufmann, San Francisco
-
Hofmeyr, S., and Forest, S. (1998). "Immunity by Design: An Artificial Immune System", The Proceedings of the 1999 Genetic and Evolutionary Computation Conference (GECCO-1999), pp. 1289-1296, Morgan-Kaufmann, San Francisco.
-
(1999)
The Proceedings of the 1999 Genetic and Evolutionary Computation Conference (GECCO-1999)
, pp. 1289-1296
-
-
Hofmeyr, S.1
Forest, S.2
-
12
-
-
0002467033
-
Architecture for an artificial immune system
-
Hofmeyr, S., and Forrest, S. (1999). "Architecture for an Artificial Immune System", Evolutionary Computation, 7(1):45-68.
-
(1999)
Evolutionary Computation
, vol.7
, Issue.1
, pp. 45-68
-
-
Hofmeyr, S.1
Forrest, S.2
-
14
-
-
1642271996
-
Artificial immunity for computer network with constraint-based detector
-
Masters Thesis, Department of Computer Science and Software Engineering, Auburn University
-
Hou, H. (2002). Artificial Immunity for Computer Network with Constraint-Based Detector, Masters Thesis, Department of Computer Science and Software Engineering, Auburn University.
-
(2002)
-
-
Hou, H.1
-
15
-
-
1642343496
-
Artificial immunity using constraint-based detectors
-
TSI Press
-
Hou, H., Zhu, J., and Dozier, G. (2002). "Artificial Immunity Using Constraint-Based Detectors", Proceedings of the 2002 World Automation Congress (WAC'02), vol. 13, pp. 239-244, TSI Press.
-
(2002)
Proceedings of the 2002 World Automation Congress (WAC'02)
, vol.13
, pp. 239-244
-
-
Hou, H.1
Zhu, J.2
Dozier, G.3
-
20
-
-
0004250162
-
-
New Riders
-
Northcutt, S., Cooper, M., Fearnow M., and Frederick, K. (2001). Intrusion Signatures and Analysis, New Riders.
-
(2001)
Intrusion Signatures and Analysis
-
-
Northcutt, S.1
Cooper, M.2
Fearnow, M.3
Frederick, K.4
-
21
-
-
84957039800
-
Principles of a computer immune system
-
Somayaji, A., Hofmeyr, S., and Forrest, S. (1997). "Principles of a Computer Immune System", The 1997 New Security Paradigm Workshop, pp. 75-82.
-
(1997)
The 1997 New Security Paradigm Workshop
, pp. 75-82
-
-
Somayaji, A.1
Hofmeyr, S.2
Forrest, S.3
-
22
-
-
1642336944
-
Distributed metastasis: A computer network penetration methodology
-
Stewart, A. J. (1999). "Distributed Metastasis: A Computer Network Penetration Methodology", available at: citeseer.nj.nec.com/387640.html.
-
(1999)
-
-
Stewart, A.J.1
-
24
-
-
1642309366
-
Use of an immune model to improve intrusion detection on dynamic broadcast local area networks
-
Masters Thesis, Department of Computer Science & Software Engineering, Auburn University
-
Zhu, J. (2002). Use of an Immune Model to Improve Intrusion Detection on Dynamic Broadcast Local Area Networks, Masters Thesis, Department of Computer Science & Software Engineering, Auburn University.
-
(2002)
-
-
Zhu, J.1
|