-
1
-
-
33847391845
-
-
J.P. Anderson, Computer security threat monitoring and surveillance, Technical Report, James P. Anderson Co., Fort Washington, PA, April 1980.
-
-
-
-
2
-
-
33847382208
-
-
D. Anderson, T. Frivold, A. Valdes, Next-generation intrusion detection expert system (NIDES): a summary, SRI-CSL-95-07, May 1995.
-
-
-
-
3
-
-
15944375471
-
Intrusion detection using hierarchical neural networks
-
Chunlin Z., Ju J., and Mohamed K. Intrusion detection using hierarchical neural networks. Pattern Recognition Lett. 26 6 (2005) 779-791
-
(2005)
Pattern Recognition Lett.
, vol.26
, Issue.6
, pp. 779-791
-
-
Chunlin, Z.1
Ju, J.2
Mohamed, K.3
-
5
-
-
0025474239
-
Tracking a few extreme singular values and vectors in signal processing
-
Comon P., and Golub G.H. Tracking a few extreme singular values and vectors in signal processing. Proceedings of the IEEE 78 8 (1990) 1327-1343
-
(1990)
Proceedings of the IEEE
, vol.78
, Issue.8
, pp. 1327-1343
-
-
Comon, P.1
Golub, G.H.2
-
9
-
-
33847417320
-
-
KDD Cup Data, 〈http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html,〉 March 2006.
-
-
-
-
11
-
-
15944386957
-
Dimension reduction using feature extraction methods for Real-time misuse detection systems
-
West Point, NY
-
Kuchimanchi G.K., Phoha V.V., Balagami K.S., and Gaddam S.R. Dimension reduction using feature extraction methods for Real-time misuse detection systems. Proceedings of the 2004 IEEE Workshop on Information Assurance and Security. West Point, NY (June 2004) 195-202
-
(2004)
Proceedings of the 2004 IEEE Workshop on Information Assurance and Security
, pp. 195-202
-
-
Kuchimanchi, G.K.1
Phoha, V.V.2
Balagami, K.S.3
Gaddam, S.R.4
-
12
-
-
33745907909
-
Detecting and visualizing denial-of-service and network probe attacks using principal component analysis
-
La Londe, France
-
Labib K., and Vemuri V.R. Detecting and visualizing denial-of-service and network probe attacks using principal component analysis. Third Conference on Security and Network Architectures. La Londe, France (June 2004)
-
(2004)
Third Conference on Security and Network Architectures
-
-
Labib, K.1
Vemuri, V.R.2
-
14
-
-
0035402096
-
Training a neural-network based intrusion detector to recognize novel attacks
-
Lee S.C., and Heinbuch D.V. Training a neural-network based intrusion detector to recognize novel attacks. IEEE Trans. System, Man Cybern., Part A 31 4 (2005) 294-299
-
(2005)
IEEE Trans. System, Man Cybern., Part A
, vol.31
, Issue.4
, pp. 294-299
-
-
Lee, S.C.1
Heinbuch, D.V.2
-
15
-
-
84885774862
-
A framework for constructing features and models for intrusion detection systems
-
Lee W., and Stolfo S. A framework for constructing features and models for intrusion detection systems. ACM Trans. Inform. Syst. Security 3 4 (2000) 227-261
-
(2000)
ACM Trans. Inform. Syst. Security
, vol.3
, Issue.4
, pp. 227-261
-
-
Lee, W.1
Stolfo, S.2
-
16
-
-
0034301517
-
The 1999 DARPA off-line intrusion detection evaluation
-
Lippmann R., Haines J., Fried D., Korba J., and Das K. The 1999 DARPA off-line intrusion detection evaluation. Comput. Networks 34 4 (2000) 579-595
-
(2000)
Comput. Networks
, vol.34
, Issue.4
, pp. 579-595
-
-
Lippmann, R.1
Haines, J.2
Fried, D.3
Korba, J.4
Das, K.5
-
17
-
-
33745894620
-
Intrusion Detection Using PCASOM Neural Networks
-
Springer, Berlin, Heidelberg
-
Liu G., and Yi Z. Intrusion Detection Using PCASOM Neural Networks. Proceedings of ISNN2006, Lecture Notes in Computer Science vol. 3973 (2006), Springer, Berlin, Heidelberg 240-245
-
(2006)
Proceedings of ISNN2006, Lecture Notes in Computer Science
, vol.3973
, pp. 240-245
-
-
Liu, G.1
Yi, Z.2
-
18
-
-
0026954958
-
Principal components, minor components, and linear neural networks
-
Oja E. Principal components, minor components, and linear neural networks. Neural Networks 5 6 (1992) 927-935
-
(1992)
Neural Networks
, vol.5
, Issue.6
, pp. 927-935
-
-
Oja, E.1
-
20
-
-
33745163595
-
-
Springer, Berlin, Heidelberg
-
Pavel L., Patrick D., Christin S., and Rieck K. Learning Intrusion Detection: Supervised or Unsupervised, Lecture Notes in Computer Science vol. 3617 (2005), Springer, Berlin, Heidelberg 50-57
-
(2005)
Learning Intrusion Detection: Supervised or Unsupervised, Lecture Notes in Computer Science
, vol.3617
, pp. 50-57
-
-
Pavel, L.1
Patrick, D.2
Christin, S.3
Rieck, K.4
-
22
-
-
13544269338
-
Application of SVM and ANN for intrusion detection
-
Wun-Hua C., Sheng-Hsun H., and Hwang-Pin S. Application of SVM and ANN for intrusion detection. Comput. Oper. Res. 32 10 (2005) 2617-2634
-
(2005)
Comput. Oper. Res.
, vol.32
, Issue.10
, pp. 2617-2634
-
-
Wun-Hua, C.1
Sheng-Hsun, H.2
Hwang-Pin, S.3
-
24
-
-
28244467214
-
A scientific approach to cyberattack detection
-
Ye N., and Farley T. A scientific approach to cyberattack detection. Computer 38 11 (2005) 55-61
-
(2005)
Computer
, vol.38
, Issue.11
, pp. 55-61
-
-
Ye, N.1
Farley, T.2
-
25
-
-
33745925265
-
An attack-norm separation approach for detecting cyber attacks
-
Ye N., Farley T., and Lakshminarasimhan D. An attack-norm separation approach for detecting cyber attacks. Inform. Syst. Frontiers 8 3 (2006) 163-177
-
(2006)
Inform. Syst. Frontiers
, vol.8
, Issue.3
, pp. 163-177
-
-
Ye, N.1
Farley, T.2
Lakshminarasimhan, D.3
|