-
1
-
-
0002067431
-
Netstat: A network based intrusion detection system
-
G. Vigna, R. Kemmerer, "Netstat: a network based intrusion detection system", Journal of Computer Security, vol. 7, no. 1, 1999.
-
(1999)
Journal of Computer Security
, vol.7
, Issue.1
-
-
Vigna, G.1
Kemmerer, R.2
-
4
-
-
85084160308
-
A study in using neural networks for anomaly and misuse detection
-
Aug. 26-29 , Washington DC
-
A.K. Ghosh, A. Schwartzbard, "A Study in Using Neural Networks for Anomaly and Misuse Detection", Proc. 8'th USENIX Security Symposium, Aug. 26-29 1999, Washington DC.
-
(1999)
Proc. 8'th USENIX Security Symposium
-
-
Ghosh, A.K.1
Schwartzbard, A.2
-
5
-
-
77949731575
-
Temporal Sequence learning and data reduction for anomaly detection
-
T. Lane, C.E. Brodley, "Temporal Sequence learning and data reduction for anomaly detection", ACM Trans, on Inform, and System Security, vol. 2, no. 3, pp. 295-261, 1999.
-
(1999)
ACM Trans, on Inform, and System Security
, vol.2
, Issue.3
, pp. 295-1261
-
-
Lane, T.1
Brodley, C.E.2
-
6
-
-
84885774862
-
A framework for constructing features and models for intrusion detection systems
-
W. Lee, S.J. Stolfo, "A framework for constructing features and models for intrusion detection systems", ACM Transactions on Inform. System Security, vol. 3, no. 4, pp. 227-261, 2000.
-
(2000)
ACM Transactions on Inform. System Security
, vol.3
, Issue.4
, pp. 227-261
-
-
Lee, W.1
Stolfo, S.J.2
-
7
-
-
27244454402
-
Real time detection of novel attacks by means of data mining techniques
-
Miami (USA), May 24-28
-
M. Esposito, C. Mazzariello, F. Oliviero, S.P. Romano, C. Sansone, "Real Time Detection of Novel Attacks by Means of Data Mining Techniques", Proceedings of the 7th International Conference on Enterprise Information Systems, Miami (USA), May 24-28, pp. 120-127, 2005.
-
(2005)
Proceedings of the 7th International Conference on Enterprise Information Systems
, pp. 120-127
-
-
Esposito, M.1
Mazzariello, C.2
Oliviero, F.3
Romano, S.P.4
Sansone, C.5
-
8
-
-
0035402096
-
Training a neural Network based intrusion detector to recognize novel attack
-
S. C. Lee, D.V. Heinbuch, "Training a neural Network based intrusion detector to recognize novel attack", IEEE Trans. Syst, Man., and Cybernetic, Part-A, vol. 31, pp. 294-299, 2001.
-
(2001)
IEEE Trans. Syst, Man., and Cybernetic, Part-A
, vol.31
, pp. 294-299
-
-
Lee, S.C.1
Heinbuch, D.V.2
-
9
-
-
0038266786
-
Computer intrusion detection with classification and anomaly detection, using SVMs
-
M. Fugate, J.R. Gattiker, "Computer Intrusion Detection with Classification and Anomaly Detection, using SVMs", International Journal of Pattern Recognition and Artificial Intelligence, vol. 17, no. 3, pp. 441-458, 2003.
-
(2003)
International Journal of Pattern Recognition and Artificial Intelligence
, vol.17
, Issue.3
, pp. 441-458
-
-
Fugate, M.1
Gattiker, J.R.2
-
10
-
-
0038330235
-
Fusion of multiple classifiers for intrusion detection in computer networks
-
G. Giacinto, F. Roli, L. Didaci, "Fusion of multiple classifiers for intrusion detection in computer networks", Pattern Recognition Letters, vol. 24, pp. 1795-1803, 2003.
-
(2003)
Pattern Recognition Letters
, vol.24
, pp. 1795-1803
-
-
Giacinto, G.1
Roli, F.2
Didaci, L.3
-
11
-
-
27244444099
-
A modular multiple classifier system for the detection of intrusions
-
G. Giacinto, F. Roli, L. Didaci, "A Modular Multiple Classifier System for the Detection of Intrusions", Lecture Notes in Computer Science vol. 2709, pp. 346-355, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2709
, pp. 346-355
-
-
Giacinto, G.1
Roli, F.2
Didaci, L.3
-
12
-
-
27244448490
-
Network intrusion detection by a multi stage classification system
-
Springer, Berlin
-
L. P. Cordella, A. Limongiello, C. Sansone, "Network Intrusion Detection by a Multi Stage Classification System", Lecture Notes in Computer Science vol. 3077, Springer, Berlin, pp. 324-333, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.3077
, pp. 324-333
-
-
Cordella, L.P.1
Limongiello, A.2
Sansone, C.3
-
13
-
-
0142126712
-
Novelty detection: A review - Part 2: Neural network based approaches
-
S. Singh, M. Markou, Novelty detection: a review - part 2: neural network based approaches, Signal Processing, vol. 83, no. 12, pp. 2499-2521, 2003.
-
(2003)
Signal Processing
, vol.83
, Issue.12
, pp. 2499-2521
-
-
Singh, S.1
Markou, M.2
-
14
-
-
84898944587
-
Intrusion detection with neural networks
-
M. Jordan et al., Eds., Cambridge, MA: MIT Press
-
J. Ryan, M.J. Lin, R. Miikkulainen, Intrusion detection with neural networks, in Advances in Neural Information Processing Systems 10, M. Jordan et al., Eds., Cambridge, MA: MIT Press, pp. 943-949, 1998.
-
(1998)
Advances in Neural Information Processing Systems
, vol.10
, pp. 943-949
-
-
Ryan, J.1
Lin, M.J.2
Miikkulainen, R.3
-
15
-
-
2442537609
-
NSOM: A real-time network-based intrusion detection system using self-organizing maps
-
Dept. of Applied Science, University of California, Davis
-
K. Labib and R. Vemuri. NSOM: A real-time network-based intrusion detection system using self-organizing maps. Technical report, Dept. of Applied Science, University of California, Davis, 2002.
-
(2002)
Technical Report
-
-
Labib, K.1
Vemuri, R.2
-
16
-
-
84928016636
-
The base-rate fallacy and the difficulty of intrusion detection
-
S. Axelsson, "The Base-Rate Fallacy and the Difficulty of Intrusion Detection", ACM Trans. on Information and System Security, vol. 3, no.3, pp. 186-205, 2000.
-
(2000)
ACM Trans. on Information and System Security
, vol.3
, Issue.3
, pp. 186-205
-
-
Axelsson, S.1
-
17
-
-
0032596610
-
Simple, fast, and effective rule learner
-
July 18-22, Orlando, Florida, USA
-
W.W. Cohen, Y. Singer, "Simple, Fast, and Effective Rule Learner" in Proc. of the Sixteenth National Conference on Artificial Intelligence and Eleventh Conference on Innovative Applications of Artificial Intelligence, July 18-22, Orlando, Florida, USA, pp. 335-342, 1999.
-
(1999)
Proc. of the Sixteenth National Conference on Artificial Intelligence and Eleventh Conference on Innovative Applications of Artificial Intelligence
, pp. 335-342
-
-
Cohen, W.W.1
Singer, Y.2
-
18
-
-
0029230267
-
A method of combining multiple experts for the recognition of unconstrained handwritten numerals
-
Y. S. Huang, C. Y. Suen, "A Method of Combining Multiple Experts for the Recognition of Unconstrained Handwritten Numerals", IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 17, no. 1, pp. 90-94, 1995.
-
(1995)
IEEE Transactions on Pattern Analysis and Machine Intelligence
, vol.17
, Issue.1
, pp. 90-94
-
-
Huang, Y.S.1
Suen, C.Y.2
-
19
-
-
0142095450
-
Neural network classification reliability: Problems and applications
-
Image Processing and Pattern Recognition, Academic Press, San Diego, CA
-
L.P. Cordella, C. Sansone, F. Tortorella, M. Vento, C. De Stefano, "Neural Network Classification Reliability: Problems and Applications", in Image Processing and Pattern Recognition, vol. 5 of Neural Network Systems Techniques and Applications, Academic Press, San Diego, CA, pp. 161-200, 1998.
-
(1998)
Neural Network Systems Techniques and Applications
, vol.5
, pp. 161-200
-
-
Cordella, L.P.1
Sansone, C.2
Tortorella, F.3
Vento, M.4
De Stefano, C.5
-
20
-
-
1842712339
-
A genetic clustering method for intrusion detection
-
Y. Liu, K. Chen, X. Liao, W. Zhang, "A genetic clustering method for intrusion detection", Pattern Recognition vol. 37, 2004.
-
(2004)
Pattern Recognition
, vol.37
-
-
Liu, Y.1
Chen, K.2
Liao, X.3
Zhang, W.4
-
21
-
-
85019691440
-
Testing intrusion detection systems: A critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by lincoln laboratory
-
J. McHugh, "Testing Intrusion Detection Systems: A Critique of the 1998 and 1999 DARPA Intrusion Detection System Evaluations as Performed by Lincoln Laboratory", ACM Transactions on Information and System Security, vol. 3, no. 4, pp. 262-294, 2000.
-
(2000)
ACM Transactions on Information and System Security
, vol.3
, Issue.4
, pp. 262-294
-
-
McHugh, J.1
-
22
-
-
0035416013
-
Difficulties in simulating the internet
-
V. Paxson, S. Floyd, "Difficulties in simulating the internet", IEEE/ACM Transactions on Networking, vol. 9, no. 4, pp. 392-403, 2001.
-
(2001)
IEEE/ACM Transactions on Networking
, vol.9
, Issue.4
, pp. 392-403
-
-
Paxson, V.1
Floyd, S.2
|