-
1
-
-
85090433665
-
-
M. Roesch, Snort: lightweight intrusion detection for networks, in: Proceedings of the 13th Conference on Systems Administration (LISA-99), Seatlle, WA, November 7-12, USENIX, 1999, pp. 229-238.
-
-
-
-
2
-
-
0009900351
-
Anomaly detection over noisy data using learned probability distributions
-
Stanford University, Stanford, CA, USA
-
Eskin E. Anomaly detection over noisy data using learned probability distributions. Proceedings of the 17th International Conference on Machine Learning (ICML 2000) (2000), Stanford University, Stanford, CA, USA 255-262
-
(2000)
Proceedings of the 17th International Conference on Machine Learning (ICML 2000)
, pp. 255-262
-
-
Eskin, E.1
-
3
-
-
33846571533
-
-
W. Lee, S.J. Stolfo, K.W. Mok, Mining in a data-flow environment: experience in network intrusion detection, in: KDD, 1999, pp. 114-124.
-
-
-
-
4
-
-
33846608350
-
-
R. Agrawal, M. Yoshi, Pnrule: a new framework for learning classifier models in data mining a case study in network intrusion detection, Technical Report RC-21719, IBM Research Division, 2000.
-
-
-
-
5
-
-
79551665842
-
-
Y. Bouzida, S. Gombault, Eigenconnections to intrusion detection, in: Security and Protection in Information Processing Systems, IFIP 18th WorldComputer Congress, TC11 19th International Information Security Conference, 22-27 August 2004, Toulouse, France, 2004, pp. 241-258.
-
-
-
-
6
-
-
45149123910
-
-
S. Axelsson, Visualising intrusions: watching the webserver, in: Security and Protection in Information Processing Systems, IFIP 18th WorldComputer Congress, TC11 19th International Information Security Conference, 22-27 August 2004, Toulouse, France, 2004, pp. 229-274.
-
-
-
-
7
-
-
4344625682
-
Vulnerability analysis of ais-based intrusion detection systems via genetic and particle swarm red teams
-
IEEE Press, Portland, Oregon
-
Dozier G.V., Brown D., Hurley J., and Cain K. Vulnerability analysis of ais-based intrusion detection systems via genetic and particle swarm red teams. Proceedings of the 2004 IEEE Congress on Evolutionary Computation (2004), IEEE Press, Portland, Oregon 111-116
-
(2004)
Proceedings of the 2004 IEEE Congress on Evolutionary Computation
, pp. 111-116
-
-
Dozier, G.V.1
Brown, D.2
Hurley, J.3
Cain, K.4
-
8
-
-
4344698326
-
Anomaly detection based on unsupervised niche clustering with application to network intrusion detection
-
IEEE Press, Portland, Oregon
-
Leon E., Nasraouli O., and Gomez J. Anomaly detection based on unsupervised niche clustering with application to network intrusion detection. Proceedings of the 2004 IEEE Congress on Evolutionary Computation (2004), IEEE Press, Portland, Oregon 502-508
-
(2004)
Proceedings of the 2004 IEEE Congress on Evolutionary Computation
, pp. 502-508
-
-
Leon, E.1
Nasraouli, O.2
Gomez, J.3
-
9
-
-
4344660279
-
An intrusion detection system using ideas from the immune system
-
IEEE Press, Portland, Oregon
-
Sergio de Paula F., Nunes de Castro L., and Licio de Geus P. An intrusion detection system using ideas from the immune system. Proceedings of the 2004 IEEE Congress on Evolutionary Computation (2004), IEEE Press, Portland, Oregon 1059-1066
-
(2004)
Proceedings of the 2004 IEEE Congress on Evolutionary Computation
, pp. 1059-1066
-
-
Sergio de Paula, F.1
Nunes de Castro, L.2
Licio de Geus, P.3
-
10
-
-
46149127936
-
The immune system, adaptation, and machine learning
-
Farmer J.D., Packard N.H., and Perelson A.S. The immune system, adaptation, and machine learning. Physica D 22 (1986) 187-204
-
(1986)
Physica D
, vol.22
, pp. 187-204
-
-
Farmer, J.D.1
Packard, N.H.2
Perelson, A.S.3
-
11
-
-
0001351468
-
Using genetic algorithms to explore pattern recognition in the immune system
-
Forrest S., Smith R.E., Javornik B., and Perelson A.S. Using genetic algorithms to explore pattern recognition in the immune system. Evolutionary Computation 1 3 (1993) 191-211
-
(1993)
Evolutionary Computation
, vol.1
, Issue.3
, pp. 191-211
-
-
Forrest, S.1
Smith, R.E.2
Javornik, B.3
Perelson, A.S.4
-
12
-
-
0034546374
-
Architecture for an artificial immune system
-
Hofmeyr S.A., and Forrest S. Architecture for an artificial immune system. Evolutionary Computation 8 4 (2000) 443-473
-
(2000)
Evolutionary Computation
, vol.8
, Issue.4
, pp. 443-473
-
-
Hofmeyr, S.A.1
Forrest, S.2
-
13
-
-
0036613083
-
An immunity-based technique to characterize intrusions in computer networks
-
Dasgupta D., and Gonzales F. An immunity-based technique to characterize intrusions in computer networks. IEEE Transactions on Evolutionary Computation 6 3 (2000) 281-291
-
(2000)
IEEE Transactions on Evolutionary Computation
, vol.6
, Issue.3
, pp. 281-291
-
-
Dasgupta, D.1
Gonzales, F.2
-
14
-
-
0036613003
-
Artificial immune system architecture for computer security applications
-
Harmer P.K., Wiliams P.D., Gunsch G.H., and Lamont G.B. Artificial immune system architecture for computer security applications. IEEE Transactions on Evolutionary Computation 6 3 (2002) 252-279
-
(2002)
IEEE Transactions on Evolutionary Computation
, vol.6
, Issue.3
, pp. 252-279
-
-
Harmer, P.K.1
Wiliams, P.D.2
Gunsch, G.H.3
Lamont, G.B.4
-
16
-
-
0031648130
-
-
E. Hart, P. Ross, J. Nelson, Producing robust schedules via an artificial immune system, in: Proceedings of the 1998 IEEE Congress on Evolutionary Computation, 1998, pp. 464-469.
-
-
-
-
17
-
-
0032317988
-
-
D. Dasgupta, An artificial immune system as a multi-agent decision support system, in: IEEE International Conferences on Systems, Man and Cybernetics, 1998, pp. 3816-3820
-
-
-
-
19
-
-
0003540748
-
-
Springer-Verlag, New York, Inc., New York, NY, USA
-
Michalewicz Z. Genetic algorithms + data structures = evolution programs. Second extended ed. (1994), Springer-Verlag, New York, Inc., New York, NY, USA
-
(1994)
Genetic algorithms + data structures = evolution programs. Second extended ed.
-
-
Michalewicz, Z.1
-
20
-
-
33847119984
-
-
M. Ostaszewski, F. Seredynski, P. Bouvry, A Nonself Space Approach to Network Anomaly Detection, in: Proceedings of NIDISC'06, held in conjuction with IPDPS 2006, Rhodes Island, Greece.
-
-
-
-
21
-
-
33846597238
-
-
D. Rutkowski, Detecting intruders in computer networks using immune system (in polish), Master's thesis, Warsaw University of Technology, 2004.
-
-
-
-
22
-
-
33846614273
-
-
M. Zissman, Darpa intrusion detection evaluation [online], http://www.ll.mit.edu/ist/ideval, Tech. Rep., MIT, 1999.
-
-
-
|