-
1
-
-
84962260018
-
"Evaluating intrusion detection systems: The 1998 DARPA off-line intrusion detection evaluation"
-
R. P. Lippmann, D. J. Fried, I. Graf, J. W. Haines, K. R. Kendall, D. McClung, D. Weber, S. E. Webster, D. Wyschogrod, R. K. Cunningham, and M. A. Zissman, "Evaluating intrusion detection systems: The 1998 DARPA off-line intrusion detection evaluation," in Proc. DARPA Inf. Survivability Confer. Exposition (DISCEX), vol. 2, 2000, pp. 12-26.
-
(2000)
Proc. DARPA Inf. Survivability Confer. Exposition (DISCEX)
, vol.2
, pp. 12-26
-
-
Lippmann, R.P.1
Fried, D.J.2
Graf, I.3
Haines, J.W.4
Kendall, K.R.5
McClung, D.6
Weber, D.7
Webster, S.E.8
Wyschogrod, D.9
Cunningham, R.K.10
Zissman, M.A.11
-
2
-
-
85019691440
-
"Testing intrusion detection systems: A critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory"
-
J. McHugh, "Testing intrusion detection systems: A critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory," ACM Trans. Inf. Syst. Security, vol. 3, no. 4, pp. 262-294, 2000.
-
(2000)
ACM Trans. Inf. Syst. Security
, vol.3
, Issue.4
, pp. 262-294
-
-
McHugh, J.1
-
3
-
-
0038428854
-
"Results of the KDD'99 classifier learning contest"
-
C. Elkan, "Results of the KDD'99 classifier learning contest," SIGKDD Explorations. ACM SIGKDD, vol. 1, no. 2, pp. 63-64, 2000.
-
(2000)
SIGKDD Explorations. ACM SIGKDD
, vol.1
, Issue.2
, pp. 63-64
-
-
Elkan, C.1
-
4
-
-
84940104123
-
"A data mining framework for building intrusion detection models"
-
L. Wenke, S. J. Stolfo, and K. W. Mok, "A data mining framework for building intrusion detection models," in Proc. IEEE Symp. Security Privacy, 1999, pp. 120-132.
-
(1999)
Proc. IEEE Symp. Security Privacy
, pp. 120-132
-
-
Wenke, L.1
Stolfo, S.J.2
Mok, K.W.3
-
5
-
-
0347606556
-
"Winning the KDD99 classification cup: Bagged boosting"
-
B. Pfahringer, "Winning the KDD99 classification cup: Bagged boosting," SIGKDD Explorations, vol. 1, no. 2, pp. 65-66, 2000.
-
(2000)
SIGKDD Explorations
, vol.1
, Issue.2
, pp. 65-66
-
-
Pfahringer, B.1
-
6
-
-
1642354876
-
"KDD-99 classifier learning contest LLSoft's results overview"
-
I. Levin, "KDD-99 classifier learning contest LLSoft's results overview," SIGKDD Explorations, vol. 1, no. 2, pp. 67-75, 2000.
-
(2000)
SIGKDD Explorations
, vol.1
, Issue.2
, pp. 67-75
-
-
Levin, I.1
-
7
-
-
21044446237
-
"The MP13 approach to the KDD'99 classifier learning contest"
-
M. Vladimir, V. Alexei, and S. Ivan, "The MP13 approach to the KDD'99 classifier learning contest," SIGKDD Explorations, vol. 1, no. 2, pp. 76-77, 2000.
-
(2000)
SIGKDD Explorations
, vol.1
, Issue.2
, pp. 76-77
-
-
Vladimir, M.1
Alexei, V.2
Ivan, S.3
-
8
-
-
0347742772
-
"Intrusion detection systems and multisensor data fusion"
-
April
-
T. Bass, "Intrusion detection systems and multisensor data fusion," Commun. ACM, vol. 43, no. 4, pp. 99-105, April 2000.
-
(2000)
Commun. ACM
, vol.43
, Issue.4
, pp. 99-105
-
-
Bass, T.1
-
9
-
-
0003290645
-
"Building a parallel computer system for $18000 that performs a half pets-flop per day"
-
F. H. Bennett III, J. R. Koza, J. Shipman, and O. Stiffelman, "Building a parallel computer system for $18000 that performs a half pets-flop per day," in Proc. Genetic Evol. Comput. Conf., 1999, pp. 1484-1490.
-
(1999)
Proc. Genetic Evol. Comput. Conf.
, pp. 1484-1490
-
-
Bennett III, F.H.1
Koza, J.R.2
Shipman, J.3
Stiffelman, O.4
-
10
-
-
0012408329
-
"Massively parallel genetic programming"
-
P. J. Angeline and K. E. Kinnear, Eds. Cambridge, MA: MIT Press, ch. 17
-
H. Juillé and J. B. Pollack, "Massively parallel genetic programming," in Advances in Genetic Programming: Volume 2, P. J. Angeline and K. E. Kinnear, Eds. Cambridge, MA: MIT Press, 1996, ch. 17, pp. 339-358.
-
(1996)
Advances in Genetic Programming: Volume 2
, pp. 339-358
-
-
Juillé, H.1
Pollack, J.B.2
-
11
-
-
0031618419
-
"Evolving computer programs using rapidly reconfigurable field programmable gate arrays and genetic programming"
-
J. R. Koza, F. H. Bennett, B. J. L. Bennett, S. L. Bade, M. A. Keane, and D. Andre, "Evolving computer programs using rapidly reconfigurable field programmable gate arrays and genetic programming," in Proc. ACM 6th Int. Symp. Field Program. Gate Arrays, 1998, pp. 209-219.
-
(1998)
Proc. ACM 6th Int. Symp. Field Program. Gate Arrays
, pp. 209-219
-
-
Koza, J.R.1
Bennett, F.H.2
Bennett, B.J.L.3
Bade, S.L.4
Keane, M.A.5
Andre, D.6
-
12
-
-
0002315591
-
"A compiling genetic programming system that directly manipulates the machine code"
-
K. E. Kinnear, Ed. Cambridge, MA: MIT Press, ch. 14
-
P. Nordin, "A compiling genetic programming system that directly manipulates the machine code," in Advances in Genetic Programming, K. E. Kinnear, Ed. Cambridge, MA: MIT Press, 1994, ch. 14, pp. 311-334.
-
(1994)
Advances in Genetic Programming
, pp. 311-334
-
-
Nordin, P.1
-
13
-
-
85008255983
-
"Dynamic training subset selection for supervised learning in genetic programming"
-
New York: Springer-Verlag, Parallel Problem Solving From Nature III
-
C. Gathercole and P. Ross, "Dynamic training subset selection for supervised learning in genetic programming," in Lecture Notes in Computer Science. New York: Springer-Verlag, 1994, vol. 866, Parallel Problem Solving From Nature III, pp. 312-321.
-
(1994)
Lecture Notes in Computer Science
, vol.866
, pp. 312-321
-
-
Gathercole, C.1
Ross, P.2
-
15
-
-
35248851166
-
"A linear genetic programming approach to intrusion detection"
-
Proc. Genetic Evol. Comput. Conf., E. Cantú-Paz et al., Eds
-
D. Song, M. I. Heywood, and A. N. Zincir-Heywood, "A linear genetic programming approach to intrusion detection," in Lecture Notes in Computer Science, vol. 2724, Proc. Genetic Evol. Comput. Conf., E. Cantú-Paz et al., Eds., 2003, pp. 2325-2336.
-
(2003)
Lecture Notes in Computer Science
, vol.2724
, pp. 2325-2336
-
-
Song, D.1
Heywood, M.I.2
Zincir-Heywood, A.N.3
-
16
-
-
84885774862
-
"A framework for constructing features and models for intrusion detection systems"
-
Nov
-
W. Lee and S. J. Stolfo, "A framework for constructing features and models for intrusion detection systems," ACM Trans. Inf. Syst. Security, vol. 3, no. 4, pp. 227-261, Nov. 2000.
-
(2000)
ACM Trans. Inf. Syst. Security
, vol.3
, Issue.4
, pp. 227-261
-
-
Lee, W.1
Stolfo, S.J.2
-
17
-
-
0036079805
-
"Host-based intrusion detection using self-organizing maps"
-
P. Lichodzijewski, A. N. Zincir-Heywood, and M. I. Heywood, "Host-based intrusion detection using self-organizing maps," in Proc. IEEE Int. Joint Conf. Neural Netw., 2002, pp. 1714-1719.
-
(2002)
Proc. IEEE Int. Joint Conf. Neural Netw.
, pp. 1714-1719
-
-
Lichodzijewski, P.1
Zincir-Heywood, A.N.2
Heywood, M.I.3
-
18
-
-
4344589298
-
"Finding general solutions to the parity problem by evolving machine-language representations"
-
L. Huelsbergen, "Finding general solutions to the parity problem by evolving machine-language representations," in Proc. 3rd Conf. Genetic Programm., 1998, pp. 158-166.
-
(1998)
Proc. 3rd Conf. Genetic Programm.
, pp. 158-166
-
-
Huelsbergen, L.1
-
19
-
-
3543125839
-
"Lexicographic parsimony pressure"
-
W. B. Langdon et al., Eds
-
S. Luke and L. Panait, "Lexicographic parsimony pressure," in Proc. Genetic Evol. Comput. Conf., W. B. Langdon et al., Eds., 2002, pp. 829-836.
-
(2002)
Proc. Genetic Evol. Comput. Conf.
, pp. 829-836
-
-
Luke, S.1
Panait, L.2
-
20
-
-
0003051712
-
"A learning machine: Part I "
-
R. M. Friedberg, "A learning machine: Part I, " IBM J. Res. Develop., vol. 2, no. 1, pp. 2-13, 1958.
-
(1958)
IBM J. Res. Develop.
, vol.2
, Issue.1
, pp. 2-13
-
-
Friedberg, R.M.1
-
21
-
-
0002258659
-
"A representation for the adaptive generation of simple sequential programs"
-
N. L. Cramer, "A representation for the adaptive generation of simple sequential programs," in Proc. Int. Conf. Genetic Algorithms and Their Applicat., 1985, pp. 183-187.
-
(1985)
Proc. Int. Conf. Genetic Algorithms and Their Applicat.
, pp. 183-187
-
-
Cramer, N.L.1
-
22
-
-
0036608308
-
"Dynamic page-based linear genetic programming"
-
M. I. Heywood and A. N. Zincir-Heywood, "Dynamic page-based linear genetic programming," IEEE Trans. Syst., Man, Cybern. B. Cybern., vol. 32, no. 3, pp. 380-388, 2002.
-
(2002)
IEEE Trans. Syst., Man, Cybern. B. Cybern.
, vol.32
, Issue.3
, pp. 380-388
-
-
Heywood, M.I.1
Zincir-Heywood, A.N.2
-
23
-
-
0042408154
-
"The heuristics of instability in model selection"
-
L. Brieman, "The heuristics of instability in model selection," Annu. Statistics, vol. 24, pp. 2350-2383, 1996.
-
(1996)
Annu. Statistics
, vol.24
, pp. 2350-2383
-
-
Brieman, L.1
-
24
-
-
0031211090
-
"A decision-theoretic generalization of on-line learning and an application to boosting"
-
Y. Freund and R. E. Schapire, "A decision-theoretic generalization of on-line learning and an application to boosting," J. Comput. Syst. Sci., vol. 55, pp. 119-139, 1997.
-
(1997)
J. Comput. Syst. Sci.
, vol.55
, pp. 119-139
-
-
Freund, Y.1
Schapire, R.E.2
-
25
-
-
0001501920
-
"Bagging, boosting and bloating in genetic programming"
-
W. Banzhaf et al., Eds
-
H. Iba, "Bagging, boosting and bloating in genetic programming," in Proc. Genetic Evol. Comput. Conf., W. Banzhaf et al., Eds., 1999, pp. 1053-1060.
-
(1999)
Proc. Genetic Evol. Comput. Conf.
, pp. 1053-1060
-
-
Iba, H.1
-
26
-
-
84959044849
-
"Applying boosting techniques to genetic programming"
-
Proc. 5th Int. Conf. Artif. Evol., P. Collet et al., Eds
-
G. Paris, D. Robilliard, and C. Ronlupt, "Applying boosting techniques to genetic programming," in Lecture Notes in Computer Science, vol. 2310, Proc. 5th Int. Conf. Artif. Evol., P. Collet et al., Eds., 2001, pp. 267-278.
-
(2001)
Lecture Notes in Computer Science
, vol.2310
, pp. 267-278
-
-
Paris, G.1
Robilliard, D.2
Ronlupt, C.3
-
27
-
-
84956852101
-
"Adapting the fitness function in GP for data mining"
-
Proc. Eur. Workshop on Genetic Program., R. Poli, P. Nordin, and W. B. Langdon, Eds
-
J. Eggermont, A. E. Eiben, and J. I. van Hemert, "Adapting the fitness function in GP for data mining," in Lecture Notes in Computer Science, vol. 1598, Proc. Eur. Workshop on Genetic Program., R. Poli, P. Nordin, and W. B. Langdon, Eds., 1999, pp. 193-202.
-
(1999)
Lecture Notes in Computer Science
, vol.1598
, pp. 193-202
-
-
Eggermont, J.1
Eiben, A.E.2
Hemert, J.I.3
-
28
-
-
0001118093
-
"Coevolving parasites improve simulation evolution as an optimization procedure"
-
W. D. Hillis, "Coevolving parasites improve simulation evolution as an optimization procedure," Physica D, vol. 42, pp. 228-234, 1990.
-
(1990)
Physica D
, vol.42
, pp. 228-234
-
-
Hillis, W.D.1
-
29
-
-
21044448959
-
"Learning lessons from the common cold: How reducing parasite virulence improves coevolutionary optimization"
-
J. Cartlidge and S. Bullock, "Learning lessons from the common cold: How reducing parasite virulence improves coevolutionary optimization," in Proc. IEEE Congr. Evol. Comput. World Congr. Comput. Intell., vol. 2, 2002, pp. 1420-1425.
-
(2002)
Proc. IEEE Congr. Evol. Comput. World Congr. Comput. Intell.
, vol.2
, pp. 1420-1425
-
-
Cartlidge, J.1
Bullock, S.2
-
30
-
-
0033712953
-
"Statistical traffic modeling for network intrusion detection"
-
J. B. D. Caberera, B. Ravichandran, and R. K. Mehra, "Statistical traffic modeling for network intrusion detection," in Proc. 8th Int. Symp. Modeling, Anal., Simulation Comput., Telecommun. Syst., 2000, pp. 466-473.
-
(2000)
Proc. 8th Int. Symp. Modeling, Anal., Simulation Comput., Telecommun. Syst.
, pp. 466-473
-
-
Caberera, J.B.D.1
Ravichandran, B.2
Mehra, R.K.3
-
31
-
-
0004204715
-
"A database of computer attacks for the evaluation of intrusion detection systems"
-
M.S. thesis, Massachusetts Inst. Technol., Cambridge, MA
-
K. Kendall, "A database of computer attacks for the evaluation of intrusion detection systems," M.S. thesis, Massachusetts Inst. Technol., Cambridge, MA, 1998.
-
(1998)
-
-
Kendall, K.1
-
32
-
-
21044447368
-
-
Cisco IOS Firewall Intrusion Detection System Documentation Oct.). [Online]. Available
-
Cisco IOS Firewall Intrusion Detection System Documentation (2004, Oct.). [Online]. Available: http://www.cisco.com/univered/cc/td/doc/ product/software/ios120/120newft/120t/120t5/iosfw2/ios_ids.htm
-
(2004)
-
-
|