-
1
-
-
17444401173
-
Extending the computer defense immune system: Network intrusion detection with a multiobjective evolutionary programming approach
-
Timmis, J. and Bentley, P. J., editors University of Kent at Canterbury. University of Kent at Canterbury Printing Unit
-
Anchor, K. P., Zydallis, J. B., Hunch, G. H., and Lamont, G. B. (2002). Extending the computer defense immune system: Network intrusion detection with a multiobjective evolutionary programming approach. In Timmis, J. and Bentley, P. J., editors, Proceedings of the 1st International Conference on Artificial Immune Systems (ICARIS), pages 12-21, University of Kent at Canterbury. University of Kent at Canterbury Printing Unit.
-
(2002)
Proceedings of the 1st International Conference on Artificial Immune Systems (ICARIS)
, pp. 12-21
-
-
Anchor, K.P.1
Zydallis, J.B.2
Hunch, G.H.3
Lamont, G.B.4
-
2
-
-
0003964874
-
Next-generation intrusion detection expert system (nides): A summary
-
Computer Science Laboratory, SRI International, Menlo Park, CA
-
Anderson, D., Frivold, T., and Valdes, A. (1995). Next-generation intrusion detection expert system (nides): A summary. Technical Report SRI-CSL-95-07, Computer Science Laboratory, SRI International, Menlo Park, CA.
-
(1995)
Technical Report
, vol.SRI-CSL-95-07
-
-
Anderson, D.1
Frivold, T.2
Valdes, A.3
-
3
-
-
0000106131
-
Inductive inference of formal languages from positive data
-
Angluin, D. (1980). Inductive inference of formal languages from positive data. Information and Control, 45(2):117-135.
-
(1980)
Information and Control
, vol.45
, Issue.2
, pp. 117-135
-
-
Angluin, D.1
-
4
-
-
84928016636
-
The base-rate fallacy and the difficulty of intrusion detection
-
Axelsson, S. (2000). The base-rate fallacy and the difficulty of intrusion detection. ACM. Transactions on Information and System Security, 3(3):186-205.
-
(2000)
ACM. Transactions on Information and System Security
, vol.3
, Issue.3
, pp. 186-205
-
-
Axelsson, S.1
-
5
-
-
0003750241
-
An architecture for intrusion detection using autonomous agents
-
Purdue University
-
Balasubramaniyan, J., Garcia-Fernandez, J. O., Spafford, E. H., and Zamboni, D. (1998). An architecture for intrusion detection using autonomous agents. Technical Report Coast TR 98-05, Purdue University.
-
(1998)
Technical Report Coast
, vol.TR 98-05
-
-
Balasubramaniyan, J.1
Garcia-Fernandez, J.O.2
Spafford, E.H.3
Zamboni, D.4
-
6
-
-
3543128182
-
Coverage and generalization in an artificial immune system
-
Balthrop, J., Esponda, F., Forrest, S., and Glickman, M. (2002a). Coverage and generalization in an artificial immune system. In GECCO-2002: Proceedings of the Genetic and Evolutionary Computation Conference.
-
(2002)
GECCO-2002: Proceedings of the Genetic and Evolutionary Computation Conference
-
-
Balthrop, J.1
Esponda, F.2
Forrest, S.3
Glickman, M.4
-
9
-
-
0001809076
-
Representation and hidden bias: Gray vs. binary coding for genetic algorithms
-
Morgan Kaufmann
-
Caruana, R. A. and Schaffer, J. D. (1988). Representation and hidden bias: Gray vs. binary coding for genetic algorithms. In MACHLERN5. Morgan Kaufmann.
-
(1988)
MACHLERN5
-
-
Caruana, R.A.1
Schaffer, J.D.2
-
11
-
-
21244449953
-
-
Personal Communication
-
Chao, D. (2001). Personal Communication.
-
(2001)
-
-
Chao, D.1
-
13
-
-
0036613083
-
An immunity-based technique to characterize intrusions in computer networks
-
Dasgupta, D. and Gonzalez, F. (2002). An immunity-based technique to characterize intrusions in computer networks. IEEE Transactions on Evolutionary Computation, 6(3):1081-1088.
-
(2002)
IEEE Transactions on Evolutionary Computation
, vol.6
, Issue.3
, pp. 1081-1088
-
-
Dasgupta, D.1
Gonzalez, F.2
-
14
-
-
0033293396
-
Towards a taxonomy of intrusion-detection systems
-
Debar, H., Dacier, M., and Wespi, A. (1999). Towards a taxonomy of intrusion-detection systems. Computer Networks, 31(8):361-378.
-
(1999)
Computer Networks
, vol.31
, Issue.8
, pp. 361-378
-
-
Debar, H.1
Dacier, M.2
Wespi, A.3
-
17
-
-
0742324903
-
A formal framework for positive and negative detection schemes
-
Esponda, F., Forrest, S., and Helman, P. (2004). A formal framework for positive and negative detection schemes. IEEE Transactions on System, Man, and Cybernetics, 34(1):357-373.
-
(2004)
IEEE Transactions on System, Man, and Cybernetics
, vol.34
, Issue.1
, pp. 357-373
-
-
Esponda, F.1
Forrest, S.2
Helman, P.3
-
18
-
-
0027961889
-
Self-nonself discrimination in a computer
-
Los Alamitos, CA. IEEE Computer Society Press
-
Forrest, S., Perelson, A. S., Allen, L., and kuri, R. C. (1994). Self-nonself discrimination in a computer. In Proceedings of the 1994 IEEE Symposium on Research in Security and Privacy, Los Alamitos, CA. IEEE Computer Society Press.
-
(1994)
Proceedings of the 1994 IEEE Symposium on Research in Security and Privacy
-
-
Forrest, S.1
Perelson, A.S.2
Allen, L.3
Kuri, R.C.4
-
19
-
-
0034827684
-
Evaluation of intrusion detectors: A decision theory approach
-
Los Alamitos, CA, USA. IEEE Computer Society
-
Gaffney, J.E., J. and Ulvila, J. (2001). Evaluation of intrusion detectors: a decision theory approach. In 2002 IEEE Symposium on Security and Privacy. S&P 2001, 14-16 May 2001, Oakland, CA, USA, pages 50-61, Los Alamitos, CA, USA. IEEE Computer Society.
-
(2001)
2002 IEEE Symposium on Security and Privacy. S&P 2001, 14-16 May 2001, Oakland, CA, USA
, pp. 50-61
-
-
Gaffney, J.E.1
Ulvila, J.2
-
20
-
-
49949150022
-
Language identification in the limit
-
Gold, E. (1967). Language identification in the limit. Information and Control, 10:447-474.
-
(1967)
Information and Control
, vol.10
, pp. 447-474
-
-
Gold, E.1
-
22
-
-
0024984013
-
A network security monitor
-
IEE Press
-
Heberlein, L. T., Dias, G. V., Levitte, K. N., Mukherjee, B., Wood, J., and Wolber, D. (1990). A network security monitor. In Proceedings of the IEEE Symposium on Security and Privacy. IEE Press.
-
(1990)
Proceedings of the IEEE Symposium on Security and Privacy
-
-
Heberlein, L.T.1
Dias, G.V.2
Levitte, K.N.3
Mukherjee, B.4
Wood, J.5
Wolber, D.6
-
23
-
-
0027668428
-
Statistical foundations of audit trail analysis for the detection of computer misuse
-
Helman, P. and Liepins, G. (1993). Statistical foundations of audit trail analysis for the detection of computer misuse. IEEE Transactions on Software Engineering, 19(9):886-901.
-
(1993)
IEEE Transactions on Software Engineering
, vol.19
, Issue.9
, pp. 886-901
-
-
Helman, P.1
Liepins, G.2
-
24
-
-
0002896413
-
Tracking drifting concepts by minimizing disagreements
-
Helmbold, D. P. and Long, P. M. (1991). TRACKING DRIFTING CONCEPTS BY MINIMIZING DISAGREEMENTS. Machine Learning, 14:27-45.
-
(1991)
Machine Learning
, vol.14
, pp. 27-45
-
-
Helmbold, D.P.1
Long, P.M.2
-
26
-
-
0034546374
-
Architecture for an artificial immune system
-
Hofmeyr, S. and Forrest, S. (2000). Architecture for an artificial immune system. Evolutionary Computation Journal, 8(4):443-473.
-
(2000)
Evolutionary Computation Journal
, vol.8
, Issue.4
, pp. 443-473
-
-
Hofmeyr, S.1
Forrest, S.2
-
27
-
-
0003707420
-
-
MIT Press
-
Holland, J., Holyoak, K., Nisbett, R., and Thagard, P. (1986). Induction: Processes of Inference, Learning, and Discovery. MIT Press.
-
(1986)
Induction: Processes of Inference, Learning, and Discovery
-
-
Holland, J.1
Holyoak, K.2
Nisbett, R.3
Thagard, P.4
-
28
-
-
0013325562
-
-
Internet Security Systems, Atlanta, GA
-
ISS (2000). RealSecure Product Datasheet. Internet Security Systems, Atlanta, GA. Available at http://www.iss.net/customer.care/resource-center/ product_lit/.
-
(2000)
RealSecure Product Datasheet
-
-
-
31
-
-
0038458266
-
An evaluation of negative seelection in an artificial immune system for network intrusion detection
-
Morgan-Kauffman
-
Kim, J. and Bentley, P. J. (2001). An evaluation of negative seelection in an artificial immune system for network intrusion detection. In Proceedings of the Genetic and Evolutionary Computation Conference (GECCO), pages 1330-1337. Morgan-Kauffman.
-
(2001)
Proceedings of the Genetic and Evolutionary Computation Conference (GECCO)
, pp. 1330-1337
-
-
Kim, J.1
Bentley, P.J.2
-
32
-
-
9444238520
-
Immune memory in the dynamic clonal selection algorithm
-
Timmis, J. and Bentley, P. J., editors, University of Kent at Canterbury. University of Kent at Canterbury Printing Unit
-
Kim, J. and Bentley, P. J. (2002a). Immune memory in the dynamic clonal selection algorithm. In Timmis, J. and Bentley, P. J., editors, Proceedings of the 1st International Conference on Artificial Immune Systems (ICARIS), pages 59-67, University of Kent at Canterbury. University of Kent at Canterbury Printing Unit.
-
(2002)
Proceedings of the 1st International Conference on Artificial Immune Systems (ICARIS)
, pp. 59-67
-
-
Kim, J.1
Bentley, P.J.2
-
33
-
-
26844572080
-
A model of gene library evolution in the dynamic clonal selection algorithm
-
Timmis, J. and Bentley, P. J., editors, University of Kent at Canterbury. University of Kent at Canterbury Printing Unit
-
Kim, J. and Bentley, P. J. (2002b). A model of gene library evolution in the dynamic clonal selection algorithm. In Timmis, J. and Bentley, P. J., editors, Proceedings of the 1st International Conference on Artificial Immune Systems (ICARIS), pages 182-189, University of Kent at Canterbury. University of Kent at Canterbury Printing Unit.
-
(2002)
Proceedings of the 1st International Conference on Artificial Immune Systems (ICARIS)
, pp. 182-189
-
-
Kim, J.1
Bentley, P.J.2
-
34
-
-
0141804082
-
Detecting concept drift with support vector machines
-
Langley, P., editor. Morgan Kaufmann
-
Klinkenberg, R. and Joachims, T. (2000). Detecting concept drift with support vector machines. In Langley, P., editor, Proceedings the 17th International Conference on Machine Learning, pages 487-494. Morgan Kaufmann.
-
(2000)
Proceedings the 17th International Conference on Machine Learning
, pp. 487-494
-
-
Klinkenberg, R.1
Joachims, T.2
-
36
-
-
84944239811
-
The 1998 Lincoln Laboratory IDS evaluation - A critique
-
Debar, H., Me, L., and Wu, S., editors. Springer-Verlag
-
McHugh, J. (2000). The 1998 Lincoln Laboratory IDS evaluation - a critique. In Debar, H., Me, L., and Wu, S., editors, Recent Advances in Intrusion Detection. Third International Workshop, RAID 2000, 2-4 Oct. 2000, Toulouse, France, pages 145-61. Springer-Verlag.
-
(2000)
Recent Advances in Intrusion Detection. Third International Workshop, RAID 2000, 2-4 Oct. 2000, Toulouse, France
, pp. 145-161
-
-
McHugh, J.1
-
38
-
-
0003682772
-
The need for biases in learning generalizations
-
Rutgers University, New Brunswick, New Jersey
-
Mitchell, T. M. (1980). The need for biases in learning generalizations. Technical Report CBM-TR-117, Rutgers University, New Brunswick, New Jersey.
-
(1980)
Technical Report
, vol.CBM-TR-117
-
-
Mitchell, T.M.1
-
39
-
-
0028477939
-
Experience with a learning personal assistant
-
Mitchell, T. M., Caruana, R., Freitag, D., McDermott, J., and Zabowski, D. (1994). Experience with a learning personal assistant. Communications of the ACM, 37(7):80-91.
-
(1994)
Communications of the ACM
, vol.37
, Issue.7
, pp. 80-91
-
-
Mitchell, T.M.1
Caruana, R.2
Freitag, D.3
McDermott, J.4
Zabowski, D.5
-
40
-
-
84949207675
-
Learning from positive data
-
Proceedings of the 6th International Workshop on Inductive Logic Programming. Springer-Verlag
-
Muggleton, S. (1996). Learning from positive data. In Proceedings of the 6th International Workshop on Inductive Logic Programming, volume 1314 of Lecture Notes in Artificial Intelligence, pages 358-376. Springer-Verlag.
-
(1996)
Lecture Notes in Artificial Intelligence
, vol.1314
, pp. 358-376
-
-
Muggleton, S.1
-
41
-
-
0028430224
-
Network intrusion detection
-
Mukherjee, B., Heberlein, L. T., and Levitt, K. N. (1994). Network intrusion detection. IEEE Network, pages 26-41.
-
(1994)
IEEE Network
, pp. 26-41
-
-
Mukherjee, B.1
Heberlein, L.T.2
Levitt, K.N.3
-
43
-
-
0027532161
-
Predicting the size of the antibody combining region from consideration of efficient self/non-self discrimination
-
Percus, J. K., Percus, O., and Perelson, A. S. (1993). Predicting the size of the antibody combining region from consideration of efficient self/non-self discrimination. Proceedings of the National Academy of Science, 90:1691-1695.
-
(1993)
Proceedings of the National Academy of Science
, vol.90
, pp. 1691-1695
-
-
Percus, J.K.1
Percus, O.2
Perelson, A.S.3
-
46
-
-
0010687369
-
A survey of connectionist network reuse through transfer
-
Thrun, S. and Pratt, L., editors, chapter 2. Kluwer Academic Publishers
-
Pratt, L. and Jennings, B. (1997). A survey of connectionist network reuse through transfer. In Thrun, S. and Pratt, L., editors, Learning to Learn, chapter 2. Kluwer Academic Publishers.
-
(1997)
Learning to Learn
-
-
Pratt, L.1
Jennings, B.2
-
47
-
-
0000646059
-
Learning internal representations by error propagation
-
Rumelhart, D. E., McClelland, J. L., et al., editors. MIT Press
-
Rumelhart, D. E., Hinton, G. E., and Williams, R. J. (1987). Learning internal representations by error propagation. In Rumelhart, D. E., McClelland, J. L., et al., editors, Parallel Distributed Processing: Volume 1: Foundations, pages 318-362. MIT Press.
-
(1987)
Parallel Distributed Processing: Volume 1: Foundations
, vol.1
, pp. 318-362
-
-
Rumelhart, D.E.1
Hinton, G.E.2
Williams, R.J.3
-
49
-
-
0041957578
-
-
Downloaded in 2003
-
Squid (2003). Squid web proxy cache. http://www.squid-cache.org/, Downloaded in 2003.
-
(2003)
Squid Web Proxy Cache
-
-
-
50
-
-
84947551624
-
Cdis: Towards a computer immune system for detecting network intrusions
-
Lee, W., Me, L., and Wespi, A., editors, RAID 2001. Springer-Verlag
-
Williams, P., Anchor, K., Bebo, J., Gunsch, G., and Lamont, G. (2001). Cdis: Towards a computer immune system for detecting network intrusions. In Lee, W., Me, L., and Wespi, A., editors, RAID 2001, volume 2212 of Lecture Notes in Computer Science, pages 117-133. Springer-Verlag.
-
(2001)
Lecture Notes in Computer Science
, vol.2212
, pp. 117-133
-
-
Williams, P.1
Anchor, K.2
Bebo, J.3
Gunsch, G.4
Lamont, G.5
|