-
2
-
-
0344666724
-
A comparative study of techniques for intrusion detection, 15th ieee international conference on tools with artificial intelligence
-
Mukkamala, S. Sung, A.: A comparative study of techniques for intrusion detection, 15th ieee international conference on tools with artificial intelligence. 15th IEEE International Conference on Tools with Artificial Intelligence - ICTAI (2003) 570 - 577
-
(2003)
15th IEEE International Conference on Tools with Artificial Intelligence - ICTAI
, pp. 570-577
-
-
Mukkamala, S.1
Sung, A.2
-
3
-
-
28444485027
-
An efficient network intrusion detection method based on information theory and genetic algorithm
-
Xia, T., Qu, G., Hariri, S., Yousif, M.: An efficient network intrusion detection method based on information theory and genetic algorithm. Performance, Computing, and Communications Conference, 2005. IPCCC 2005 (2005) 11-17
-
(2005)
Performance, Computing, and Communications Conference, 2005. IPCCC 2005
, pp. 11-17
-
-
Xia, T.1
Qu, G.2
Hariri, S.3
Yousif, M.4
-
4
-
-
85047322127
-
An application of machine learning to network intrusion detection
-
Sinclair, C., Pierce, L., Matzner, S.: An application of machine learning to network intrusion detection. In: Computer Security Applications Conference, ACSAC '99 (1999) 371-377
-
(1999)
Computer Security Applications Conference, ACSAC '99
, pp. 371-377
-
-
Sinclair, C.1
Pierce, L.2
Matzner, S.3
-
5
-
-
33646851992
-
A software implementation of a genetic algorithm based approach to network intrusion detection
-
Ren Hui Gong; Zulkernine, M.; Abolmaesumi, P.: A software implementation of a genetic algorithm based approach to network intrusion detection. Sixth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing - SNPD/SAWN 2005 (2005) 246 - 253
-
(2005)
Sixth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing - SNPD/SAWN 2005
, pp. 246-253
-
-
Gong, R.H.1
Zulkernine, M.2
Abolmaesumi, P.3
-
7
-
-
21044433766
-
Training genetic programming on half a million patterns: An example from anomaly detection
-
Song, D., Heywood, M.I., Zincir-Heywood, A.N.: Training genetic programming on half a million patterns: an example from anomaly detection. IEEE Transactions on Evolutionary Computation 9(3) (2005) 225-239
-
(2005)
IEEE Transactions on Evolutionary Computation
, vol.9
, Issue.3
, pp. 225-239
-
-
Song, D.1
Heywood, M.I.2
Zincir-Heywood, A.N.3
-
8
-
-
67650418236
-
Detecting new forms of network intrusion using genetic programming
-
Sarker, R., Reynolds, R., Abbass, H., Tan, K.C., McKay, B., Essam, D., Gedeon, T., eds., Canberra, IEEE Press
-
Lu, W., Traore, I.: Detecting new forms of network intrusion using genetic programming. In Sarker, R., Reynolds, R., Abbass, H., Tan, K.C., McKay, B., Essam, D., Gedeon, T., eds.: Proceedings of the 2003 Congress on Evolutionary Computation CEC2003, Canberra, IEEE Press (2003) 2165-2172
-
(2003)
Proceedings of the 2003 Congress on Evolutionary Computation CEC2003
, pp. 2165-2172
-
-
Lu, W.1
Traore, I.2
-
9
-
-
74949104861
-
Applying genetic programming to intrusion detection
-
Siegel, E.V., Koza, J.R., eds., MIT, Cambridge, MA, USA, AAAI
-
Crosbie, M., Spafford, E.H.: Applying genetic programming to intrusion detection. In Siegel, E.V., Koza, J.R., eds.: Working Notes for the AAAI Symposium on Genetic Programming, MIT, Cambridge, MA, USA, AAAI (1995) 1-8
-
(1995)
Working Notes for the AAAI Symposium on Genetic Programming
, pp. 1-8
-
-
Crosbie, M.1
Spafford, E.H.2
-
10
-
-
84925368904
-
802.11 denial-of-service attacks: Real vulnerabilities and practical solutions
-
Bellardo, J., Savage, S.: 802.11 denial-of-service attacks: real vulnerabilities and practical solutions. In: USENIX Security Symposium. (2003) 15-28
-
(2003)
USENIX Security Symposium
, pp. 15-28
-
-
Bellardo, J.1
Savage, S.2
-
11
-
-
0003697989
-
-
(R2003). IEEE, New York, NY, USA
-
IEEE-SA Standards Board: ANSI/IEEE Std 802.11, 1999 Edition (R2003). IEEE, New York, NY, USA (1999)
-
(1999)
ANSI/IEEE Std 802.11, 1999 Edition
-
-
-
12
-
-
84949223752
-
Weaknesses in the key scheduling algorithm of RC4
-
Fluhrer, S., Mantin, I., Shamir, A.: Weaknesses in the key scheduling algorithm of RC4. Lecture Notes in Computer Science 2259 (2001) 1-24
-
(2001)
Lecture Notes in Computer Science
, vol.2259
, pp. 1-24
-
-
Fluhrer, S.1
Mantin, I.2
Shamir, A.3
-
14
-
-
33745736185
-
-
Kismet
-
Kershaw, M.: Kismet http://www.kismetwireless.net/ (2005)
-
(2005)
-
-
Kershaw, M.1
-
15
-
-
4544317724
-
Wireless intrusion detection and response: A case study using the classic man-in-the-middle attack
-
Atlanta Ga
-
Schmoyer, T., Lim, Y.X., Owen, H.: Wireless Intrusion Detection and Response: A case study using the classic man-in-the-middle attack. In: IEEE Wireless Communications and Networking Conference, Atlanta Ga. (2004)
-
(2004)
IEEE Wireless Communications and Networking Conference
-
-
Schmoyer, T.1
Lim, Y.X.2
Owen, H.3
-
16
-
-
0036608308
-
Dynamic page based crossover in linear genetic programming
-
Heywood, M.I., Zincir-Heywood, A.N.: Dynamic page based crossover in linear genetic programming. IEEE Transactions on Systems, Man, and Cybernetics: Part B - Cybernetics 32(3) (2002) 380-388
-
(2002)
IEEE Transactions on Systems, Man, and Cybernetics: Part B - Cybernetics
, vol.32
, Issue.3
, pp. 380-388
-
-
Heywood, M.I.1
Zincir-Heywood, A.N.2
-
17
-
-
85008255983
-
Dynamic training subset selection for supervised learning in genetic programming
-
Davidor, Y., Schwefel, H.P., Männer, R., eds.: Parallel Problem Solving from Nature III. Jerusalem, Springer-Verlag
-
Gathercole, C., Ross, P.: Dynamic training subset selection for supervised learning in genetic programming. In Davidor, Y., Schwefel, H.P., Männer, R., eds.: Parallel Problem Solving from Nature III. Volume 866 of LNCS., Jerusalem, Springer-Verlag (1994) 312-321
-
(1994)
LNCS
, vol.866
, pp. 312-321
-
-
Gathercole, C.1
Ross, P.2
|