-
1
-
-
0002067431
-
Netstat: A network based intrusion detection system
-
G. Vigna, R. Kemmerer, "Netstat: a network based intrusion detection system", Journal of Computer Security, vol. 7, no. 1, 1999.
-
(1999)
Journal of Computer Security
, vol.7
, Issue.1
-
-
Vigna, G.1
Kemmerer, R.2
-
2
-
-
0004309520
-
Research in intrusion detection systems: A survey
-
Chalmers University of Technology
-
S. Axelsson, Research in Intrusion Detection Systems: A Survey, TR 98-17, Chalmers University of Technology, 1999.
-
(1999)
TR
, vol.98
, Issue.17
-
-
Axelsson, S.1
-
4
-
-
85084160308
-
A study in using neural networks for anomaly and misuse detection
-
Aug. 26-29 Washington DC
-
A.K. Ghosh, A. Schwartzbard, "A Study in Using Neural Networks for Anomaly and Misuse Detection", Proc. 8'th USENIX Security Symposium, Aug. 26-29 1999, Washington DC.
-
(1999)
Proc. 8'th USENIX Security Symposium
-
-
Ghosh, A.K.1
Schwartzbard, A.2
-
5
-
-
77949731575
-
Temporal sequence learning and data reduction for anomaly detection
-
T. Lane, C.E. Bradley, "Temporal Sequence learning and data reduction for anomaly detection", ACM Trans, on Inform, and System Security, vol. 2, no. 3, pp. 295-261, 1999.
-
(1999)
ACM Trans, on Inform, and System Security
, vol.2
, Issue.3
, pp. 295-1261
-
-
Lane, T.1
Bradley, C.E.2
-
6
-
-
84885774862
-
A framework for constructing features and models for intrusion detection systems
-
W. Lee, S.J. Stolfo, "A framework for constructing features and models for intrusion detection systems", ACM Transactions on Inform. System Security, vol. 3, no. 4, pp. 227-261, 2000.
-
(2000)
ACM Transactions on Inform. System Security
, vol.3
, Issue.4
, pp. 227-261
-
-
Lee, W.1
Stolfo, S.J.2
-
7
-
-
27244454402
-
Real time detection of novel attacks by means of data mining techniques
-
Miami (USA), May 24-28, (in press)
-
M. Esposito, C. Mazzariello, F. Oliviero, S.P. Romano, C. Sansone, "Real Time Detection of Novel Attacks by Means of Data Mining Techniques", Proceedings of the 7th International Conference on Enterprise Information Systems, Miami (USA), May 24-28, 2005 (in press).
-
(2005)
Proceedings of the 7th International Conference on Enterprise Information Systems
-
-
Esposito, M.1
Mazzariello, C.2
Oliviero, F.3
Romano, S.P.4
Sansone, C.5
-
8
-
-
0035402096
-
Training a neural network based intrusion detector to recognize novel attack
-
S. C. Lee, D.V. Heinbuch, "Training a neural Network based intrusion detector to recognize novel attack", IEEE Trans. Syst, Man., and Cybernetic, Part-A, vol. 31, pp. 294-299, 2001.
-
(2001)
IEEE Trans. Syst, Man., and Cybernetic, Part-A
, vol.31
, pp. 294-299
-
-
Lee, S.C.1
Heinbuch, D.V.2
-
9
-
-
0038266786
-
Computer intrusion detection with classification and anomaly detection, using SVMs
-
M. Fugate, J.R. Gattiker, "Computer Intrusion Detection with Classification and Anomaly Detection, using SVMs", International Journal of Pattern Recognition and artificial Intelligence, vol. 17, no. 3, pp. 441-458, 2003.
-
(2003)
International Journal of Pattern Recognition and Artificial Intelligence
, vol.17
, Issue.3
, pp. 441-458
-
-
Fugate, M.1
Gattiker, J.R.2
-
10
-
-
0038330235
-
Fusion of multiple classifiers for intrusion detection in computer networks
-
G. Giacinto, F. Roli, L. Didaci, "Fusion of multiple classifiers for intrusion detection in computer networks", Pattern Recognition Letters, vol. 24, pp. 1795-1803, 2003.
-
(2003)
Pattern Recognition Letters
, vol.24
, pp. 1795-1803
-
-
Giacinto, G.1
Roli, F.2
Didaci, L.3
-
11
-
-
27244444099
-
A modular multiple classifier system for the detection of intrusions
-
G. Giacinto, F. Roli, L. Didaci, "A Modular Multiple Classifier System for the Detection of Intrusions", Lecture Notes in Computer Science vol. 2709, pp. 346-355, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2709
, pp. 346-355
-
-
Giacinto, G.1
Roli, F.2
Didaci, L.3
-
12
-
-
27244448490
-
Network intrusion detection by a multi stage classification system
-
Springer, Berlin
-
L. P. Cordella, A. Limongiello, C. Sansone, "Network Intrusion Detection by a Multi Stage Classification System", Lecture Notes in Computer Science vol. 3077, Springer, Berlin, pp. 324-333, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.3077
, pp. 324-333
-
-
Cordella, L.P.1
Limongiello, A.2
Sansone, C.3
-
13
-
-
84928016636
-
The base-rate fallacy and the difficulty of intrusion detection
-
S. Axelsson, "The Base-Rate Fallacy and the Difficulty of Intrusion Detection", ACM Trans, on Information and System Security, vol. 3, no.3, pp. 186-205, 2000.
-
(2000)
ACM Trans, on Information and System Security
, vol.3
, Issue.3
, pp. 186-205
-
-
Axelsson, S.1
-
15
-
-
85019691440
-
Testing intrusion detection systems: A critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln laboratory
-
J. McHugh, "Testing Intrusion Detection Systems: A Critique of the 1998 and 1999 DARPA Intrusion Detection System Evaluations as Performed by Lincoln Laboratory", ACM Transactions on Information and System Security, vol. 3, no. 4, pp. 262-294, 2000.
-
(2000)
ACM Transactions on Information and System Security
, vol.3
, Issue.4
, pp. 262-294
-
-
McHugh, J.1
-
16
-
-
1842712339
-
A genetic clustering method for intrusion detection
-
Y. Liu, K. Chen, X. Liao, W. Zhang, "A genetic clustering method for intrusion detection", Pattern Recognition vol. 37, 2004.
-
(2004)
Pattern Recognition
, vol.37
-
-
Liu, Y.1
Chen, K.2
Liao, X.3
Zhang, W.4
|