-
2
-
-
33745773307
-
Data mining for intrusion detection: A critical review
-
IBM Zurich Research Laboratory. Switzerland
-
Julisch, K.: Data Mining for Intrusion Detection: A Critical Review. Research Report RZ 3398, IBM Zurich Research Laboratory. Switzerland (2002)
-
(2002)
Research Report
, vol.RZ 3398
-
-
Julisch, K.1
-
3
-
-
84885774862
-
A framework for constructing features and models for intrusion detection systems
-
ACM Press, New York
-
Lee, W., Stolfo, S.J.: A Framework for Constructing Features and Models for Intrusion Detection Systems. ACM Transactions on Information and System Security (TISSEC), Vol. 3(4). ACM Press, New York (2000) 227 - 261
-
(2000)
ACM Transactions on Information and System Security (TISSEC)
, vol.3
, Issue.4
, pp. 227-261
-
-
Lee, W.1
Stolfo, S.J.2
-
4
-
-
26844471735
-
A cooperative unsupervised connectionist model applied to identify anomalous massive SNMP data sending
-
Proceedings of the International Conference on Natural Computation (ICNC). Springer-Verlag, Berlin Heidelberg New York
-
Herrero, A., Corchado, E., Sáiz, J.M.: A Cooperative Unsupervised Connectionist Model Applied to Identify Anomalous Massive SNMP Data Sending. Proceedings of the International Conference on Natural Computation (ICNC). Lecture Notes in Computer Science, Vol. 3610. Springer-Verlag, Berlin Heidelberg New York (2005) 778-782
-
(2005)
Lecture Notes in Computer Science
, vol.3610
, pp. 778-782
-
-
Herrero, A.1
Corchado, E.2
Sáiz, J.M.3
-
5
-
-
33646252706
-
Detecting compounded anomalous SNMP situations using unsupervised pattern recognition
-
Proceedings of the International Conference on Artificial Neural Networks (ICANN 2005). Springer-Verlag, Berlin Heidelberg New York
-
Corchado, E., Herrero, A., Sáiz J.M.: Detecting Compounded Anomalous SNMP Situations Using Unsupervised Pattern Recognition. Proceedings of the International Conference on Artificial Neural Networks (ICANN 2005). Lecture Notes in Computer Science, Vol. 3697. Springer-Verlag, Berlin Heidelberg New York (2005) 905-910
-
(2005)
Lecture Notes in Computer Science
, vol.3697
, pp. 905-910
-
-
Corchado, E.1
Herrero, A.2
Sáiz, J.M.3
-
7
-
-
0038767888
-
Computer intrusion detection and network monitoring: A statistical viewpoint
-
Springer-Verlag, Berlin Heidelberg New York
-
Marchette, D.J.: Computer Intrusion Detection and Network Monitoring: A Statistical Viewpoint. Information Science and Statistics. Springer-Verlag, Berlin Heidelberg New York (2001)
-
(2001)
Information Science and Statistics
-
-
Marchette, D.J.1
-
10
-
-
33745653877
-
Interactive visualization for network and port scan detection
-
Proceedings of the 8th International Symposium on Recent Advances in Intrusion Detection (RAID). Springer-Verlag, Berlin Heidelberg New York
-
Muelder, Ch., Ma, K-L., Bartoletti, T.: Interactive Visualization for Network and Port Scan Detection. Proceedings of the 8th International Symposium on Recent Advances in Intrusion Detection (RAID). Lecture Notes in Computer Science, Vol. 3858. Springer-Verlag, Berlin Heidelberg New York (2005)
-
(2005)
Lecture Notes in Computer Science
, vol.3858
-
-
Muelder, Ch.1
Ma, K.-L.2
Bartoletti, T.3
-
11
-
-
33745460819
-
Visualizing network data for intrusion detection
-
Abdullah, K., Lee, Ch., Conti, G., Copeland, J.A.: Visualizing Network Data for Intrusion Detection. Proceedings of the IEEE Workshop on Information Assurance and Security (2002) 100-108
-
(2002)
Proceedings of the IEEE Workshop on Information Assurance and Security
, pp. 100-108
-
-
Abdullah, K.1
Lee, Ch.2
Conti, G.3
Copeland, J.A.4
-
14
-
-
1642460019
-
Structuring global responses of local filters using lateral connections
-
Corchado, E., Han, Y., Fyfe, C.: Structuring Global Responses of Local Filters Using Lateral Connections. Journal of Experimental and Theoretical Artificial Intelligence, Vol. 15(4) (2003) 473-487
-
(2003)
Journal of Experimental and Theoretical Artificial Intelligence
, vol.15
, Issue.4
, pp. 473-487
-
-
Corchado, E.1
Han, Y.2
Fyfe, C.3
-
15
-
-
0842267461
-
Connectionist techniques for the identification and suppression of interfering underlying factors
-
Corchado, E., Fyfe, C.: Connectionist Techniques for the Identification and Suppression of Interfering Underlying Factors. International Journal of Pattern Recognition and Artificial Intelligence, Vol. 17(8) (2003) 1447-1466
-
(2003)
International Journal of Pattern Recognition and Artificial Intelligence
, vol.17
, Issue.8
, pp. 1447-1466
-
-
Corchado, E.1
Fyfe, C.2
-
16
-
-
35048842338
-
Constructing a global and integral model of business management using a CBR system
-
Proceedings of the 1st International Conference on Cooperative Design, Visualization and Engineering (CDVE). Springer-Verlag, Berlin Heidelberg New York
-
Corchado, E., Corchado, J.M., Sáiz, L., Lara, A.: Constructing a Global and Integral Model of Business Management Using a CBR System. Proceedings of the 1st International Conference on Cooperative Design, Visualization and Engineering (CDVE). Lecture Notes in Computer Science, Vol. 3190. Springer-Verlag, Berlin Heidelberg New York (2004) 141-147
-
(2004)
Lecture Notes in Computer Science
, vol.3190
, pp. 141-147
-
-
Corchado, E.1
Corchado, J.M.2
Sáiz, L.3
Lara, A.4
-
17
-
-
0016102310
-
A projection pursuit algorithm for exploratory data analysis
-
Friedman J., Tukey. J.: A Projection Pursuit Algorithm for Exploratory Data Analysis. IEEE Transaction on Computers, Vol. 23 (1974) 881-890
-
(1974)
IEEE Transaction on Computers
, vol.23
, pp. 881-890
-
-
Friedman, J.1
Tukey, J.2
-
18
-
-
18044403793
-
Complexity pursuit: Separating interesting components from time series
-
Hyvärinen A.: Complexity Pursuit: Separating Interesting Components from Time Series. Neural Computation, Vol. 13(4) (2001) 883-898
-
(2001)
Neural Computation
, vol.13
, Issue.4
, pp. 883-898
-
-
Hyvärinen, A.1
-
19
-
-
3543075142
-
Maximum and minimum likelihood Hebbian learning for exploratory projection pursuit
-
Kluwer Academic Publishing
-
Corchado, E., MacDonald, D., Fyfe, C.: Maximum and Minimum Likelihood Hebbian Learning for Exploratory Projection Pursuit. Data Mining and Knowledge Discovery, Vol. 8(3), Kluwer Academic Publishing (2004) 203-225
-
(2004)
Data Mining and Knowledge Discovery
, vol.8
, Issue.3
, pp. 203-225
-
-
Corchado, E.1
MacDonald, D.2
Fyfe, C.3
-
21
-
-
84862911217
-
The rectified gaussian distribution
-
Seung, H.S., Socci, N.D., Lee, D.: The Rectified Gaussian Distribution. Advances in Neural Information Processing Systems, Vol. 10 (1998) 350-356
-
(1998)
Advances in Neural Information Processing Systems
, vol.10
, pp. 350-356
-
-
Seung, H.S.1
Socci, N.D.2
Lee, D.3
-
22
-
-
14844312929
-
Operational experiences with high-volume network intrusion detection
-
ACM Press, New York, USA
-
Dreger, H., Feldmann, A., Paxson, V., Sommer, R.: Operational Experiences with High-Volume Network Intrusion Detection. Proceedings of the ACM Conference on Computer and Communications Security. ACM Press, New York, USA. (2004) 2-11
-
(2004)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 2-11
-
-
Dreger, H.1
Feldmann, A.2
Paxson, V.3
Sommer, R.4
-
23
-
-
0002399288
-
Neural networks, principal components and subspaces
-
Oja, E.: Neural Networks, Principal Components and Subspaces. International Journal of Neural Systems, Vol. 1 (1989) 61-68
-
(1989)
International Journal of Neural Systems
, vol.1
, pp. 61-68
-
-
Oja, E.1
|