-
1
-
-
0034301517
-
The 1999 DARPA off-line intrusion detection evaluation
-
Oct.
-
Lippmann RP, Haines JW, Fried DJ, Korba J, et al. "The 1999 DARPA off-line intrusion detection evaluation". Computer Networks, Vol 34, No.4, pp.579-595, Oct. 2000
-
(2000)
Computer Networks
, vol.34
, Issue.4
, pp. 579-595
-
-
Lippmann, R.P.1
Haines, J.W.2
Fried, D.J.3
Korba, J.4
-
2
-
-
0036928063
-
Artificial immune theory based network intrusion detection system and the algorithms design
-
Beijing, November
-
Yang XR, Shen JY, Wang R. "Artificial immune theory based network intrusion detection system and the algorithms design", Proceedings of 2002 International Conference on Machine Learning and Cybernetics, Beijing, pp.73-77, November 2002.
-
(2002)
Proceedings of 2002 International Conference on Machine Learning and Cybernetics
, pp. 73-77
-
-
Yang, X.R.1
Shen, J.Y.2
Wang, R.3
-
3
-
-
2942533003
-
SAD: Web session anomaly detection based on parameter estimation
-
June
-
Cho S. Cha S, "SAD: web session anomaly detection based on parameter estimation", Computers & Security, Vol.23, No.4, pp.265-351, June 2004
-
(2004)
Computers & Security
, vol.23
, Issue.4
, pp. 265-351
-
-
Cho, S.1
Cha, S.2
-
4
-
-
0242468747
-
An anomaly intrusion detection method by clustering normal user behavior
-
November
-
Oh SH and Lee WS. "An anomaly intrusion detection method by clustering normal user behavior", Computers & Security, Vol 22, No.7, pp.596-612, November, 2003
-
(2003)
Computers & Security
, vol.22
, Issue.7
, pp. 596-612
-
-
Oh, S.H.1
Lee, W.S.2
-
5
-
-
4444382384
-
Distributed intrusion detection system based on data fusion method
-
Hangzhou, June
-
Wang Y, Yang HH, Wang XY, et al. "Distributed Intrusion Detection System Based on Data Fusion Method", The 5th World Congress on Intelligent Control and Automation, Hangzhou, pp.4331-4334, June 2004
-
(2004)
The 5th World Congress on Intelligent Control and Automation
, pp. 4331-4334
-
-
Wang, Y.1
Yang, H.H.2
Wang, X.Y.3
-
8
-
-
17644369553
-
Network intrusion detection based on support vector machine
-
June
-
Li H, Guan XH, Zan X, et al, "Network intrusion detection based on support vector machine", Journal of Computer Research and Development, Vol 40, No.6, pp.799-807, June 2003
-
(2003)
Journal of Computer Research and Development
, vol.40
, Issue.6
, pp. 799-807
-
-
Li, H.1
Guan, X.H.2
Zan, X.3
-
9
-
-
0742307309
-
Feature subset selection for support vector machines through discriminative function
-
Feb.
-
Mao K.Z., "Feature Subset Selection for Support Vector Machines through Discriminative Function", IEEE Transaction on Systems, Man, and Cybernetics-Part B: cybernetics, Vol 34 No.1, pp.60-67, Feb. 2004
-
(2004)
IEEE Transaction on Systems, Man, and Cybernetics-part B: Cybernetics
, vol.34
, Issue.1
, pp. 60-67
-
-
Mao, K.Z.1
-
10
-
-
0030082551
-
The ant system: Optimization by a colony of cooperating agents
-
Dorigo M, Gambardella L M. "The Ant System: Optimization by a colony of cooperating agents". IEEE Transactions on Systems, Man, and Cybernetics-Part B, Vol 26, No.1, pp.29-41, 1996
-
(1996)
IEEE Transactions on Systems, Man, and Cybernetics-part B
, vol.26
, Issue.1
, pp. 29-41
-
-
Dorigo, M.1
Gambardella, L.M.2
-
11
-
-
26844502385
-
-
KDD Cup 99 Data, http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html.
-
KDD Cup 99 Data
-
-
-
12
-
-
28444461986
-
-
LIBSVM, http://www.csie.ntu.edu.tw/~cjlin/libsvm/.
-
-
-
|