-
1
-
-
85042784997
-
Naive bayesian networks in intrusion detection systems
-
Cavtat Dubrovnik, Croatia
-
N. Ben Amor, S. Benferhat, and Z. Elouedi. Naive bayesian networks in intrusion detection systems. In Probabilistic Graphical Models for Classification, pages 11-23, Cavtat Dubrovnik, Croatia, 2003.
-
(2003)
Probabilistic Graphical Models for Classification
, pp. 11-23
-
-
Ben Amor, N.1
Benferhat, S.2
Elouedi, Z.3
-
2
-
-
2442424268
-
Naive bayes vs decision trees in intrusion detection systems
-
Nicosia, Cyprus
-
N. Ben Amor, S. Benferhat, and Z. Elouedi. Naive bayes vs decision trees in intrusion detection systems. In ACM symposium on Applied computing (SAC2004), pages 420-424, Nicosia, Cyprus, 2004.
-
(2004)
ACM symposium on Applied computing (SAC2004)
, pp. 420-424
-
-
Ben Amor, N.1
Benferhat, S.2
Elouedi, Z.3
-
3
-
-
0003516333
-
Intrusion detection systems: A survey and taxonomy
-
Technical report 99-15
-
S. Axelsson. Intrusion detection systems: a survey and taxonomy. Technical report 99-15, 2000.
-
(2000)
-
-
Axelsson, S.1
-
5
-
-
33847231141
-
-
KDD
-
KDD. http://kdd.ccs.uci.edu/databases/kddcup99.1999.
-
(1999)
-
-
-
6
-
-
33847235563
-
-
K. Kendall. A Database of Computer Attacks for the Evaluation of Intrusion Detection Systems. Massachusetts Institute of Technology, Master Thesis, 1999.
-
K. Kendall. A Database of Computer Attacks for the Evaluation of Intrusion Detection Systems. Massachusetts Institute of Technology, Master Thesis, 1999.
-
-
-
-
9
-
-
33847190878
-
-
J. R. Quinlan. C4.5: Programs for machine learning. Morgan Kaufmann, San Mateo, California, 1993.
-
J. R. Quinlan. C4.5: Programs for machine learning. Morgan Kaufmann, San Mateo, California, 1993.
-
-
-
-
10
-
-
49649112245
-
Why machine learning algorithms fail in misuse detection on kdd intrusion detection data set
-
Analy-sis
-
M. Sabhnani and G. Serpen. Why machine learning algorithms fail in misuse detection on kdd intrusion detection data set. Journal of Intelligent Data Analy-sis, 2004.
-
(2004)
Journal of Intelligent Data
-
-
Sabhnani, M.1
Serpen, G.2
-
11
-
-
84944220475
-
-
A. Valdes and K. Skinner. Adaptive model-based monitoring for cyber attack detection. In Actes du Recent Advances in Intrusion Detection (RAID 2000), pages 80-92, Toulouse, France, 2000.
-
A. Valdes and K. Skinner. Adaptive model-based monitoring for cyber attack detection. In Actes du Recent Advances in Intrusion Detection (RAID 2000), pages 80-92, Toulouse, France, 2000.
-
-
-
-
12
-
-
0026860706
-
Methods of combining multiple classifiers and their applications to handwriting recognition
-
L. Xu, A. Kryzak, and C. V. Suen. Methods of combining multiple classifiers and their applications to handwriting recognition. In IEEE Transactions on Systems, Man and Cybernetics, volume 22(3), 418-435, 1992.
-
(1992)
IEEE Transactions on Systems, Man and Cybernetics
, vol.22
, Issue.3
, pp. 418-435
-
-
Xu, L.1
Kryzak, A.2
Suen, C.V.3
|