-
1
-
-
0032676506
-
"A data mining framework for building intrusion detection models"
-
W. Lee, S. Stolfo, and K. Mok, "A data mining framework for building intrusion detection models," in Proc. 1999 IEEE Symp. Security and Privacy, 1999, pp. 120-132.
-
(1999)
Proc. 1999 IEEE Symp. Security and Privacy
, pp. 120-132
-
-
Lee, W.1
Stolfo, S.2
Mok, K.3
-
2
-
-
84962238645
-
"Cost-based modeling and evaluation for fraud and intrusion detection: Results from the JAM project"
-
S. Stolfo, W. Fan, W. Lee, A. Prodromidis, and P. Chan, "Cost-based modeling and evaluation for fraud and intrusion detection: Results from the JAM project," in Proc. DARPA Information Survivabilty Conf. and Expo., vol. II, 2000, pp. 130-144.
-
(2000)
Proc. DARPA Information Survivabilty Conf. and Expo.
, vol.2
, pp. 130-144
-
-
Stolfo, S.1
Fan, W.2
Lee, W.3
Prodromidis, A.4
Chan, P.5
-
3
-
-
17444386776
-
The Third International Knowledge Discovery and Data Mining Tools Competition
-
Online. Available:
-
S. Stolfo et al.. (2002) The Third International Knowledge Discovery and Data Mining Tools Competition. Online. Available: http://kdd.ics.uci.edu/databases/kddCup99/kddCup99.html
-
(2002)
-
-
Stolfo, S.1
-
6
-
-
0012292276
-
"A neural network approach toward intrusion detection"
-
Washington, DC
-
K. Fox, R. Henning, and J. Reed, "A neural network approach toward intrusion detection," in Proc. 13th Nat. Computer Security Conf., Washington, DC, 1990.
-
(1990)
Proc. 13th Nat. Computer Security Conf.
-
-
Fox, K.1
Henning, R.2
Reed, J.3
-
8
-
-
4544353927
-
"Multiple self-organizing maps for intrusion detection"
-
Baltimore, MD, Oct
-
B. Rhodes, J. Mahaffey, and J. Cannady, "Multiple self-organizing maps for intrusion detection," in Proc. 23rd Nat. Information Systems Security Conf., Baltimore, MD, Oct. 2000.
-
(2000)
Proc. 23rd Nat. Information Systems Security Conf.
-
-
Rhodes, B.1
Mahaffey, J.2
Cannady, J.3
-
9
-
-
9444243157
-
Hybrid Neural Networks for Intrusion Detection Systems
-
Online. Available
-
C. Jirapummin, N. Wattanapongsakorn, and P. Kanthamanon. Hybrid Neural Networks for Intrusion Detection Systems. Online. Available: http://dbvis.fmi.uni-konstanz-de/members/panse/seminar_ws0203/
-
-
-
Jirapummin, C.1
Wattanapongsakorn, N.2
Kanthamanon, P.3
-
11
-
-
84964411176
-
"Real time data mining-based intrusion detection"
-
W. Lee, S. Stolfo, P. Chan, E. Eskin, W. Fan, M. Miller, S. Hershkop, and J. Zhang, "Real time data mining-based intrusion detection," in Proc. 2nd DARPA Information Survivability Conf. and Expo., vol. 1, 2001, pp. 89-100.
-
(2001)
Proc. 2nd DARPA Information Survivability Conf. and Expo.
, vol.1
, pp. 89-100
-
-
Lee, W.1
Stolfo, S.2
Chan, P.3
Eskin, E.4
Fan, W.5
Miller, M.6
Hershkop, S.7
Zhang, J.8
-
12
-
-
0023294428
-
"An intrusion-detection model"
-
Feb
-
D. Denning, "An intrusion-detection model," IEEE Trans. Software Eng., vol. SE-13, no. 2, pp. 222-232, Feb. 1987.
-
(1987)
IEEE Trans. Software Eng.
, vol.SE-13
, Issue.2
, pp. 222-232
-
-
Denning, D.1
-
13
-
-
84962260018
-
"Evaluating intrusion detection systems: The 1998 DARPA off-line intrusion detection evaluation"
-
R. P. LippMann, D. J. Fried, I. Graf, J. W. Haines, K. R. Kendall, D. McClung, D. Weber, S. E. Webster, D. Wyschogrod, R. K. Cunningham, and M. A. Zissman, "Evaluating intrusion detection systems: The 1998 DARPA off-line intrusion detection evaluation," in Proc. DARPA Information Survivability Conf. and Expo., vol. 2, 2000, pp. 12-26.
-
(2000)
Proc. DARPA Information Survivability Conf. and Expo.
, vol.2
, pp. 12-26
-
-
Lippmann, R.P.1
Fried, D.J.2
Graf, I.3
Haines, J.W.4
Kendall, K.R.5
McClung, D.6
Weber, D.7
Webster, S.E.8
Wyschogrod, D.9
Cunningham, R.K.10
Zissman, M.A.11
-
14
-
-
85019691440
-
"Testing intrusion detection systems: A critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln laboratory"
-
J. McHugh, "Testing intrusion detection systems: A critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln laboratory," ACM Trans. Inform. Syst. Security, vol. 3, pp. 262-294, 2000.
-
(2000)
ACM Trans. Inform. Syst. Security
, vol.3
, pp. 262-294
-
-
McHugh, J.1
-
16
-
-
0036472459
-
"Anomaly detection in embedded systems"
-
Feb
-
R. A. Maxion and K. M. C. Tan, "Anomaly detection in embedded systems," IEEE Trans. Comput., vol. 51, no. 2, pp. 108-120, Feb. 2002.
-
(2002)
IEEE Trans. Comput.
, vol.51
, Issue.2
, pp. 108-120
-
-
Maxion, R.A.1
Tan, K.M.C.2
-
17
-
-
0037252253
-
"Determining the operational limits of an anomaly-based intrusion detector"
-
Jan
-
K. M. C. Tan and R. A. Maxion, "Determining the operational limits of an anomaly-based intrusion detector," IEEE J. Select. Areas Commun. vol. 21, no. 1, pp. 96-110, Jan. 2003.
-
(2003)
IEEE J. Select. Areas Commun.
, vol.21
, Issue.1
, pp. 96-110
-
-
Tan, K.M.C.1
Maxion, R.A.2
-
18
-
-
0003410791
-
-
3rd extended ed, ser. Information Sciences. Berlin, Germany: Springer
-
T. Kohonen, Self-Organizing Maps, 3rd extended ed, ser. Information Sciences. Berlin, Germany: Springer, 2001, vol. 30.
-
(2001)
Self-Organizing Maps
, vol.30
-
-
Kohonen, T.1
-
19
-
-
0036925621
-
"Research on some problems in the Kohonen SOM algorithm"
-
Nov
-
H. Ying, T. Feng, J. Cao, X. Ding, and Y. Zhou, "Research on some problems in the Kohonen SOM algorithm," in Proc. Int. Conf. Machine Learning and Cybernetics, vol. 3, Nov. 2002, pp. 1279-1282.
-
(2002)
Proc. Int. Conf. Machine Learning and Cybernetics
, vol.3
, pp. 1279-1282
-
-
Ying, H.1
Feng, T.2
Cao, J.3
Ding, X.4
Zhou, Y.5
-
20
-
-
0037002475
-
"Intrusion detection: A brief history and overview"
-
Apr
-
R. A. Kemmerer and G. Vigna, "Intrusion detection: A brief history and overview," Computer, vol. 35, no. 4, pp. 27-30, Apr. 2002.
-
(2002)
Computer
, vol.35
, Issue.4
, pp. 27-30
-
-
Kemmerer, R.A.1
Vigna, G.2
-
21
-
-
0036588773
-
"Incorporating soft computing techniques into a probabilistic intrusion detection system"
-
May
-
S. Cho, "Incorporating soft computing techniques into a probabilistic intrusion detection system," IEEE Trans. Syst., Man, Cybern., pt. C, vol. 32, no. 2, pp. 154-160, May 2002.
-
(2002)
IEEE Trans. Syst., Man, Cybern.
, vol.32
, Issue.2 PART C
, pp. 154-160
-
-
Cho, S.1
-
22
-
-
0036647172
-
"Multivariate statistical analysis of audit trails for host-based intrusion detection"
-
Jul
-
N. Ye, S. M. Emran, Q. Chen, and S. Vilbert, "Multivariate statistical analysis of audit trails for host-based intrusion detection," IEEE Trans. Comput., vol. 51, no. 7, pp. 810-820, Jul. 2002.
-
(2002)
IEEE Trans. Comput.
, vol.51
, Issue.7
, pp. 810-820
-
-
Ye, N.1
Emran, S.M.2
Chen, Q.3
Vilbert, S.4
-
23
-
-
0037844902
-
"A self-organizing map for adaptive processing of structured data"
-
May
-
M. Hagenbuchner, A. Sperduti, and A. Tsoi, "A self-organizing map for adaptive processing of structured data," IEEE Trans. Neural Netw. vol. 14, no. 3, pp. 491-505, May 2003.
-
(2003)
IEEE Trans. Neural Netw.
, vol.14
, Issue.3
, pp. 491-505
-
-
Hagenbuchner, M.1
Sperduti, A.2
Tsoi, A.3
-
24
-
-
0036128861
-
"ViSOM - A novel method for multivariate data projection and structure visualization"
-
Jan
-
H. Yin, "ViSOM - A novel method for multivariate data projection and structure visualization," IEEE Trans. Neural Netw., vol. 13, no. 1, pp. 237-243, Jan. 2002.
-
(2002)
IEEE Trans. Neural Netw.
, vol.13
, Issue.1
, pp. 237-243
-
-
Yin, H.1
-
25
-
-
0036804085
-
"Network intrusion and fault detection: A statistical anomaly approach"
-
Oct
-
C. Manikopoulos and S. Papavassiliou, "Network intrusion and fault detection: A statistical anomaly approach," IEEE Commun. Mag., vol. 40, no. 10, pp. 76-82, Oct. 2002.
-
(2002)
IEEE Commun. Mag.
, vol.40
, Issue.10
, pp. 76-82
-
-
Manikopoulos, C.1
Papavassiliou, S.2
-
26
-
-
1942436335
-
"Robustness of the Markov-chain model for cyber-attack detection"
-
Mar
-
N. Ye, Y. Zhang, and C. M. Borror, "Robustness of the Markov-chain model for cyber-attack detection," IEEE Trans. Rel., vol. 53, no. 1, pp. 116-123, Mar. 2004.
-
(2004)
IEEE Trans. Rel.
, vol.53
, Issue.1
, pp. 116-123
-
-
Ye, N.1
Zhang, Y.2
Borror, C.M.3
-
27
-
-
84943383590
-
"Identifying important features for intrusion detection using support vector machines and neural networks"
-
Jan
-
A. H. Sung and S. Mukkamala, "Identifying important features for intrusion detection using support vector machines and neural networks," in Proc. 2003 Symp. Applications and the Internet, Jan. 2003, pp. 209-216.
-
(2003)
Proc. 2003 Symp. Applications and the Internet
, pp. 209-216
-
-
Sung, A.H.1
Mukkamala, S.2
|