-
1
-
-
34047184261
-
-
Symantec internet security threat report highlights rise in threats to confidential information (symantec.com), Accessed: 2005, May 10. Available: http://www.prdomain.com/companies/s/symantec/newsreleases/200503mar/ symantec_internet_20050321.htm.
-
"Symantec internet security threat report highlights rise in threats to confidential information (symantec.com)," Accessed: 2005, May 10. Available: http://www.prdomain.com/companies/s/symantec/newsreleases/200503mar/ symantec_internet_20050321.htm.
-
-
-
-
2
-
-
84966620150
-
Testing and evaluating computer intrusion detection systems
-
R. Durst, T. Champion, B. Witten, E. Miller, and L. Spagnuolo, "Testing and evaluating computer intrusion detection systems," Commun. ACM, vol. 42, no. 7, pp. 53-61, 1999.
-
(1999)
Commun. ACM
, vol.42
, Issue.7
, pp. 53-61
-
-
Durst, R.1
Champion, T.2
Witten, B.3
Miller, E.4
Spagnuolo, L.5
-
3
-
-
84943383590
-
Identifying important features for intrusion detection using support vector machines and neural networks
-
A. Sung and S. Mukkamala, "Identifying important features for intrusion detection using support vector machines and neural networks," in Symposium on Applications and the Internet, pp. 209-216, 2003.
-
(2003)
Symposium on Applications and the Internet
, pp. 209-216
-
-
Sung, A.1
Mukkamala, S.2
-
4
-
-
34047109692
-
-
A tutorial on clustering algorithms, Accessed: 2004, October 1. Available: http://www.elet.polimi.it/upload/matteucc/Clustering/ tutorial_html/kmeans.html.
-
"A tutorial on clustering algorithms," Accessed: 2004, October 1. Available: http://www.elet.polimi.it/upload/matteucc/Clustering/ tutorial_html/kmeans.html.
-
-
-
-
5
-
-
34047152812
-
-
S. Kaplantzis, Classification techniques for network intrusion detection, 4th year thesis project, Monash University, 2004.
-
S. Kaplantzis, "Classification techniques for network intrusion detection," 4th year thesis project, Monash University, 2004.
-
-
-
-
6
-
-
0004235910
-
-
Grassroots series (Palgrave Firm, Basingstoke: Palgrave, 2nd ed
-
P. Picton, Neural networks. Grassroots series (Palgrave (Firm)), Basingstoke: Palgrave, 2nd ed., 2000.
-
(2000)
Neural networks
-
-
Picton, P.1
-
9
-
-
34047176426
-
-
Accessed: 2004, September 21. Available
-
D. Lai, "Welcome to daniel lai," Accessed: 2004, September 21. Available: http://www-personal.monash.edu.au/~dlai.
-
Welcome to daniel lai
-
-
Lai, D.1
-
10
-
-
34047176936
-
-
Darpa intrusion detection evaluation mit lin-coln laboratory, Accessed: 2004, October 1. Available
-
"Darpa intrusion detection evaluation (mit lin-coln laboratory)," Accessed: 2004, October 1. Available:http://www.11.mit.edu/ IST/ideval/.
-
-
-
-
11
-
-
17144386187
-
Efficient and robust classification method using combined feature vector for lane detection
-
P. Jeong and S. Nedevschi, "Efficient and robust classification method using combined feature vector for lane detection," Circuits and Systems for Video Technology, IEEE Transactions on, vol. 15, no. 4, pp. 528-537, 2005.
-
(2005)
Circuits and Systems for Video Technology, IEEE Transactions on
, vol.15
, Issue.4
, pp. 528-537
-
-
Jeong, P.1
Nedevschi, S.2
-
12
-
-
84943421730
-
On the self-similarity of synthetic traffic for the evaluation of intrusion detection systems
-
W. Allen and G. Marin, "On the self-similarity of synthetic traffic for the evaluation of intrusion detection systems," in Symposium on Applications and the Internet, pp. 242-248, 2003.
-
(2003)
Symposium on Applications and the Internet
, pp. 242-248
-
-
Allen, W.1
Marin, G.2
-
13
-
-
33845885921
-
-
A. Bivens, C. Palagiri, R. Smith, B. Szymanski, and M. Membrechts, "Network based intrustion detection using neural networks," 2002.
-
(2002)
Network based intrustion detection using neural networks
-
-
Bivens, A.1
Palagiri, C.2
Smith, R.3
Szymanski, B.4
Membrechts, M.5
-
14
-
-
0036804085
-
Network intrusion and fault detection: A statistical anomaly approach
-
C. Manikopoulos and S. Papavassiliou, "Network intrusion and fault detection: a statistical anomaly approach," Communications Magazine, IEEE, vol. 40, no. 10, pp. 76-82, 2002.
-
(2002)
Communications Magazine, IEEE
, vol.40
, Issue.10
, pp. 76-82
-
-
Manikopoulos, C.1
Papavassiliou, S.2
|