-
2
-
-
0003914522
-
State of the practice of intrusion detection technologies
-
CMU/SEI-99-TR-028
-
J. Allen, A. Christie, and W. Fithen, State of the Practice of Intrusion Detection Technologies, Technical Report, CMU/SEI-99-TR-028, 2000.
-
(2000)
Technical Report
-
-
Allen, J.1
Christie, A.2
Fithen, W.3
-
3
-
-
0003907293
-
-
Macmillan Technical Publishing, Indianapolis, USA
-
R.G. Bace, Intrusion Detection, Macmillan Technical Publishing, Indianapolis, USA, 2000.
-
(2000)
Intrusion Detection
-
-
Bace, R.G.1
-
5
-
-
27144489164
-
A tutorial on support vector machines for pattern recognition
-
C. Burge, A Tutorial on Support Vector Machines for Pattern Recognition, Data mining and knowledge discovery journal, 2(2), 121-167, 1998.
-
(1998)
Data Mining and Knowledge Discovery Journal
, vol.2
, Issue.2
, pp. 121-167
-
-
Burge, C.1
-
6
-
-
0346076782
-
Support vector learning for fuzzy rule-based classification systems
-
Y. Chen and J.Z. Wang, Support Vector Learning for Fuzzy Rule-Based Classification Systems, IEEE Transactions on Fuzzy Systems, 11(6), 716-728, 2003.
-
(2003)
IEEE Transactions on Fuzzy Systems
, vol.11
, Issue.6
, pp. 716-728
-
-
Chen, Y.1
Wang, J.Z.2
-
7
-
-
0242302742
-
Intrusion detection
-
B.V. Dasarathy, Intrusion detection, Information Fusion, 4(4), 243-245, 2003.
-
(2003)
Information Fusion
, vol.4
, Issue.4
, pp. 243-245
-
-
Dasarathy, B.V.1
-
8
-
-
0344835883
-
Characterising complexity by the degrees of freedom in a radial basis function network
-
D. Lowe, Characterising complexity by the degrees of freedom in a radial basis function network, Neurocomputing, 19(1-3), 199-209, 1998.
-
(1998)
Neurocomputing
, vol.19
, Issue.1-3
, pp. 199-209
-
-
Lowe, D.1
-
9
-
-
0035792373
-
Fuzzy intrusion detection
-
J.E. Dickerson, J. Juslin, O. Loulousoula, and J. A. Dickerson, Fuzzy Intrusion Detection, IFSA World Congress and 20th North American Fuzzy Information Processing Society (NAFIPS) International Conference, 2001, pp1506-1510.
-
(2001)
IFSA World Congress and 20th North American Fuzzy Information Processing Society (NAFIPS) International Conference
, pp. 1506-1510
-
-
Dickerson, J.E.1
Juslin, J.2
Loulousoula, O.3
Dickerson, J.A.4
-
10
-
-
27544512530
-
Data mining for intrusion detection, a critical review
-
D. Barbara and S. Jajodia (Eds.), Kluwer Academic Publisher
-
K. Julish, Data Mining for Intrusion Detection, a Critical Review, in Applications of Data Mining in Computer Security, D. Barbara and S. Jajodia (Eds.), Kluwer Academic Publisher, 2002.
-
(2002)
Applications of Data Mining in Computer Security
-
-
Julish, K.1
-
12
-
-
0002714543
-
Making large-scale SVM learning practical
-
B. Schölkopf, C. Burges and A. Smola (Eds.), MIT-Press
-
T. Joachims, Making large-Scale SVM Learning Practical, in Advances in Kernel Methods - Support Vector Learning, B. Schölkopf, C. Burges and A. Smola (Eds.), MIT-Press, 1999.
-
(1999)
Advances in Kernel Methods - Support Vector Learning
-
-
Joachims, T.1
-
13
-
-
84872281780
-
-
KDD Cup 1999: http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html
-
KDD Cup 1999
-
-
-
14
-
-
85084163349
-
Data mining approaches for intrusion detection
-
W. Lee and S.J. Stolfo, Data Mining Approaches for Intrusion Detection, 7th USENIX Security Symposium, 1998, pp. 79-94.
-
(1998)
7th USENIX Security Symposium
, pp. 79-94
-
-
Lee, W.1
Stolfo, S.J.2
-
15
-
-
0034247240
-
Mining fuzzy association rules and fuzzy frequency episodes for intrusion detection
-
J. Luo and S.M. Bridges, Mining Fuzzy Association Rules and Fuzzy Frequency Episodes for Intrusion Detection, International Journal of Intelligent Systems, 15(8), 687-704, 2000.
-
(2000)
International Journal of Intelligent Systems
, vol.15
, Issue.8
, pp. 687-704
-
-
Luo, J.1
Bridges, S.M.2
-
16
-
-
27544490151
-
NFIDS: A neuro-fuzzy intrusion detection system
-
M. Mohajerani, A. Moeini and M. Kianie, NFIDS: A Neuro-fuzzy Intrusion Detection System, Proceedings of the 10th IEEE International Conference on Electronics, Circuits and Systems, 2003, pp348-351.
-
(2003)
Proceedings of the 10th IEEE International Conference on Electronics, Circuits and Systems
, pp. 348-351
-
-
Mohajerani, M.1
Moeini, A.2
Kianie, M.3
-
17
-
-
0242408742
-
Artificial intelligent techniques for intrusion detection
-
S. Mukkamala and A.H. Sung, Artificial Intelligent Techniques for Intrusion Detection, IEEE International Conference on Systems, Man and Cybernetics, 2003, vol.2, 1266-1271.
-
(2003)
IEEE International Conference on Systems, Man and Cybernetics
, vol.2
, pp. 1266-1271
-
-
Mukkamala, S.1
Sung, A.H.2
-
18
-
-
0037142572
-
Anomaly intrusion detection method based on HMM
-
Y. Qiao, X.W. Xin, Y. Bin and S. Ge, Anomaly Intrusion Detection Method Based on HMM, Electronics Letters, 38(13), 663-664, 2002.
-
(2002)
Electronics Letters
, vol.38
, Issue.13
, pp. 663-664
-
-
Qiao, Y.1
Xin, X.W.2
Bin, Y.3
Ge, S.4
-
19
-
-
0037832491
-
Fuzzy clustering for intrusion detection
-
May
-
H. Shah, J. Undercoffer and A. Joshi, Fuzzy Clustering for Intrusion Detection, The 12th IEEE International Conference on Fuzzy Systems, May 2003, vol. 2, pp1274-1278.
-
(2003)
The 12th IEEE International Conference on Fuzzy Systems
, vol.2
, pp. 1274-1278
-
-
Shah, H.1
Undercoffer, J.2
Joshi, A.3
-
21
-
-
1642404668
-
Genetic algorithm optimization of membership functions for mining fuzzy association rules
-
Atlantic City, NJ
-
W.D. Wang and S. Bridges, Genetic Algorithm Optimization of Membership Functions for Mining Fuzzy Association Rules, Proceedings of the 7th International Conference on Fuzzy Theory & Technology, Atlantic City, NJ, 2000, pp131-134.
-
(2000)
Proceedings of the 7th International Conference on Fuzzy Theory & Technology
, pp. 131-134
-
-
Wang, W.D.1
Bridges, S.2
|