-
1
-
-
0003907293
-
-
Macmillan Technical Publishing, Indianapolis, USA.
-
R. Bace, "Intrusion Detection," Macmillan Technical Publishing, Indianapolis, USA., 2000.
-
(2000)
Intrusion Detection
-
-
Bace, R.1
-
2
-
-
0038304302
-
A conceptual intrusion monitoring architecture and thoughts on practical implementation
-
P. Downland, S. Furnell, "A Conceptual Intrusion Monitoring Architecture and Thoughts on Practical Implementation," in IFEP'00, 2000.
-
(2000)
IFEP'00
-
-
Downland, P.1
Furnell, S.2
-
3
-
-
0027719169
-
A process approach to information security management
-
WG 11.1, Toronto, Canada
-
R. Von, "A process approach to information security management," in IFIP'93, WG 11.1, Toronto, Canada, 1993.
-
(1993)
IFIP'93
-
-
Von, R.1
-
4
-
-
0042484572
-
2001 CSI/FBI computer crime and security survey
-
R. Power, "2001 CSI/FBI Computer Crime and Security Survey," Computer Security Issues and Trends. Vol. VII, No. 1, pp. 1-20, 2001.
-
(2001)
Computer Security Issues and Trends.
, vol.7
, Issue.1
, pp. 1-20
-
-
Power, R.1
-
5
-
-
0032676506
-
A data mining framework for building intrusion detection models
-
W. Lee, S. Stolfo, K. Mok, "A data mining framework for building intrusion detection models," in Proceedings of the 1999 IEEE Symposium on Security and Privacy, 1999, pp. 120-132.
-
(1999)
Proceedings of the 1999 IEEE Symposium on Security and Privacy
, pp. 120-132
-
-
Lee, W.1
Stolfo, S.2
Mok, K.3
-
6
-
-
84964411176
-
Real time data mining-based intrusion detection
-
W. Lee, S. Stolfo, S. Chan, et al. "Real time data mining-based intrusion detection," in Proceedings of DARPA Information Survivability Conference & Exposition II, Vol. 1, 2001, pp. 89-100.
-
(2001)
Proceedings of DARPA Information Survivability Conference & Exposition II
, vol.1
, pp. 89-100
-
-
Lee, W.1
Stolfo, S.2
Chan, S.3
-
7
-
-
0142095474
-
Using artificial anomalies to detect unknown and known network intrusions
-
W. Fan, M. Miller, S. J. Stolfo, W. Lee, P. K. Chan, "Using artificial anomalies to detect unknown and known network intrusions," in Proceedings IEEE International Conference on Data Mining, 2001, pp. 123-130.
-
(2001)
Proceedings IEEE International Conference on Data Mining
, pp. 123-130
-
-
Fan, W.1
Miller, M.2
Stolfo, S.J.3
Lee, W.4
Chan, P.K.5
-
8
-
-
0037002475
-
Intrusion detection: A brief history and overview
-
R. Kemmerer, G, Vigna, "Intrusion detection: a brief history and overview," Computer, Vol. 35, Issue 4, pp. 27-30, 2002.
-
(2002)
Computer
, vol.35
, Issue.4
, pp. 27-30
-
-
Kemmerer, R.1
Vigna, G.2
-
11
-
-
0141540496
-
Y-means: A clustering method for intrusion detection
-
G. Yu, A. Ghorbani, N. Belacel, "Y-means: a clustering method for intrusion detection," IEEE Canadian Conference on Electrical and Computer Engineering. Vol.2, 2003, pp.1083 -1086.
-
(2003)
IEEE Canadian Conference on Electrical and Computer Engineering
, vol.2
, pp. 1083-1086
-
-
Yu, G.1
Ghorbani, A.2
Belacel, N.3
-
12
-
-
0242408742
-
Artificial intelligent techniques for intrusion detection
-
S. Mukkamala, A. Sung, "Artificial intelligent techniques for intrusion detection," in IEEE International Conference on Systems, Man and Cybernetics. Vol. 2, 2003, pp. 1266-1271.
-
(2003)
IEEE International Conference on Systems, Man and Cybernetics
, vol.2
, pp. 1266-1271
-
-
Mukkamala, S.1
Sung, A.2
-
13
-
-
0242637516
-
Adaptive intrusion detection with data mining
-
Hossain M, Bridges S, Vaughn R. Adaptive intrusion detection with data mining IEEE International Conference on Systems, Man and Cybernetics. Vol. 4, 2003, pp. 3097-3103.
-
(2003)
IEEE International Conference on Systems, Man and Cybernetics
, vol.4
, pp. 3097-3103
-
-
Hossain, M.1
Bridges, S.2
Vaughn, R.3
-
15
-
-
0038103911
-
Utilising fuzzy logic and trend analysis for effective intrusion detection
-
B. Martin, S. Rossouw, "Utilising fuzzy logic and trend analysis for effective intrusion detection," Computers & Security. Vol. 22, No. 5, pp. 423-434, 2003.
-
(2003)
Computers & Security
, vol.22
, Issue.5
, pp. 423-434
-
-
Martin, B.1
Rossouw, S.2
-
16
-
-
0034300682
-
Intrusion detection using autonomous agents
-
H. Eugene, Z. Diego, "Intrusion detection using autonomous agents," Computer Networks, Vol. 34, pp. 547-570., 2000.
-
(2000)
Computer Networks
, vol.34
, pp. 547-570
-
-
Eugene, H.1
Diego, Z.2
-
17
-
-
0038643297
-
A hybrid model for intrusion detection based on temporal probabilistic networks
-
Beijing, China, 20-25 August
-
A. Seleznyov, "A Hybrid Model for Intrusion Detection Based on Temporal Probabilistic Networks", in IFIP'00, Beijing, China, 20-25 August, 2000.
-
(2000)
IFIP'00
-
-
Seleznyov, A.1
-
18
-
-
0037142572
-
Anomaly intrusion detection method based on HMM
-
Y. Qiao, X. Xin, Y. Bin, S. Ge, "Anomaly intrusion detection method based on HMM," Electronics Letters. Vol. 38, Issue 13, pp. 663-664, 2002.
-
(2002)
Electronics Letters
, vol.38
, Issue.13
, pp. 663-664
-
-
Qiao, Y.1
Xin, X.2
Bin, Y.3
Ge, S.4
-
20
-
-
0242468747
-
An anomaly intrusion detection method by clustering normal user behavior
-
H. Sang, S. Won, "An anomaly intrusion detection method by clustering normal user behavior," Computers and Security, Vol. 22, No. 7, pp. 596-612, 2003.
-
(2003)
Computers and Security
, vol.22
, Issue.7
, pp. 596-612
-
-
Sang, H.1
Won, S.2
-
21
-
-
0037209446
-
Host-based intrusion detection using dynamic and static behavioral models
-
D. Yeung, Y. Ding, "Host-based intrusion detection using dynamic and static behavioral models," Pattern Recognition. Vol. 36, pp. 229-243, 2003.
-
(2003)
Pattern Recognition
, vol.36
, pp. 229-243
-
-
Yeung, D.1
Ding, Y.2
-
22
-
-
13544269338
-
Application of SVM and ANN for intrusion detection
-
W. Chen, S. Hsu, H. Shen, "Application of SVM and ANN for intrusion detection," Computers and Operations Research, Vol. 32, pp. 2617-2634, 2005.
-
(2005)
Computers and Operations Research
, vol.32
, pp. 2617-2634
-
-
Chen, W.1
Hsu, S.2
Shen, H.3
|